a&s international oct 2014(trial version)

25

Upload: messe-frankfurt-new-era-business-media-ltd-taiwan-branch

Post on 05-Apr-2016

235 views

Category:

Documents


4 download

DESCRIPTION

The Leading International Security Magazine for Professional Buyers.

TRANSCRIPT

Page 1: A&s international Oct 2014(trial version)
Page 2: A&s international Oct 2014(trial version)

14 OCT 2014

������������������������ �������

������� ������ ������ �������

���� ���������������� ������������������ ���!��������������"�#���$%�����&������

P.66 P.86

Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well.

��������'���(���� �����!��

( ������%���$� ���

)����&������ ��!��������� ( ������%���$� �����������

P.56

P.50

Page 3: A&s international Oct 2014(trial version)

16 OCT 2014

��������

P.14 ��������P.18 �����������P.20 �������������

P.30 ������������������P.94 ������ �����P.96 �����������

P.92 �������� ����P.101 ����������� ���!����

!��� ������������ �����

�������

��������" �����������

��#����

#�������� ����� !���&*��$�����&�����!�������

�(+��������&�'�������� ��

P.36

P.90

Everyone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.

�������,���$����������� X)�#

P.74

����������*��#��(�&� ���%���$� �������� ���&���-������,�� ��������.+��/

P.82

Page 4: A&s international Oct 2014(trial version)

�����������

18 OCT 2014

Apple’s iPhone 6 was finally launched this September. Again, it caused great sensation around the globe. Besides the better looking design and other advanced functionalities, the iPhone 6 now has an NFC antenna in it, supporting payment via Apple Pay. And, in keeping with its previous feature, iPhone 6 also has a finger-print scanner inside, which further helps with identity verification to secure the transaction. So far Apple still hasn’t opened up its APIs to other developers, and it is still hard to develop NFC-enabled devices for iPhones. However, through the launch of the latest iPhone and other smartphones, we can predict, in the near future, that NFC will surely become the next trend for many industries after Bluetooth technologies; again igniting the growth momentum of NFC used for physical access control, too.

As the trend of online or mobile payment gains popularity and the industry starts to provide different methods to open and manage doors — instead of using traditional keys and cards only — the access control market has become more interesting and ready to grow and develop further. One issue the trend brings up is how to better manage and secure people’s identities in different occasions and for different purposes. This month, we discussed how and what companies are providing to manage and protect identities in the enterprise sector. Multifactor access control systems, with biometrics, combined with advanced encryption technologies, are what the industry mostly offers. However, the challenge right now is still low market awareness toward identity management and protection from end users. In the future, through the launch of more NFC-enabled smartphones and other devices, we hope identity management can be more greatly valued!

Remember to check out this issue’s cover story for more information. Hope you enjoy it.

��������[email protected]

������������ ��������������������

Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shi General Manager Editorial General Press [email protected]

Jill Lai Editor in Chief [email protected]

Alf Chang Senior Consultant [email protected]

Eifeh Strom Senior Editor [email protected]

Steve Chin Reporter [email protected]

William Pao Reporter [email protected]

Lisa Hsu Reporter [email protected]

Weiting Chen Coordinator [email protected]

Art Design

Gaven Lee Executive Designer [email protected]

Mao Chang Designer [email protected]

Arthur Wu Designer [email protected]

Circulation & Subscription

Michelle Shih Coordinator [email protected]

Corporate Management

Collins Yuan Group Manager [email protected]

Thomas Pin Account Manager [email protected]

Chihung Lee IT Manager [email protected]

asmag.com

Jerry Wu Assistant Manager [email protected]

Secutech

Peggy Wu Trade Fair Manager [email protected]

Echo Lin Manager [email protected]

Eva Tsai Project Manager [email protected]

International Advertising

[Headquarters]

Juihui Lin Manager [email protected]

Kay Yang Operation Officer [email protected]

Audrey Fang Coordinator [email protected]

Wayne Ho Sales Officer [email protected]

[Branches & Representatives]

Bobbie Ferraro USA/Canada [email protected]

Carolina Pattuelli Europe (Italy) [email protected]

Tenzile Cavus Europe (Turkey) [email protected]

Evris Consolos Europe (U.K.) [email protected]

Muris Hadzic Southeast Europe [email protected]

Manish Gandhi India [email protected]

Iris Lai China [email protected]

Y. C. Suh Korea [email protected]

Takashi Komori Japan [email protected]

Nguyen Thu Ha Vietnam [email protected]

a&s International, published by Messe Frankfurt New Era Business

Media Ltd., is a monthly professional publication for channel players

in the worldwide electronic security industry since 1997. It updates

importers, distributors, OEM/ODM searchers, system integrators

and other product purchasers on product sources and identifies

developments in CCTV, Digital Surveillance, Access Control,

Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

Automation and other fields relevant to electronic security.

������������ ������������������������ ���Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, TaiwanPhone/886 2 2659 9080Fax/886 2 2659 9069Website/www.mfnewera.com

������������ ������������������������ ����������������������������������� ���� �� �������������!"#�$�������%&&'�������� �(�� ������������)�������)������� *�������� ������ ����+������)������)������(�,�����-����� �����)� ����� ������*�����.*����� ��/�������"����(�,������/������"��0 ��� ���/���"��!��������)�����/��*������(/��* ���"��1*�����"��0� �//�����"��#�/� ��������"��.���������)�����/��*�����1*���� ���"��.��������"��!�������"��0 �/����"��0������"��2��������"��3�� �������/���������� ����

��������������� ������ ������ ��������������� ������������������� �������� ���������������������� ������������������ ������������� ��� ������������������ ������������� �!�"����� ����������#������$%&'�����

( �������)*+,-.��#��������/��0��1����.������������������������/ ���� ��������2���������������������������� ������������������� ������������������ �������� ���������� ������ �������������

�������������������� ����������

�����*�(������������������������� �������/������� �� ����� ����4�����/� ��5����������������� ����

Page 5: A&s international Oct 2014(trial version)

��� ��������

20 OCT 2014

The Physical Security Interoperability Alliance (PSIA) announced it has achieved important new milestones within its physical logical access interoperability (PLAI) specification less than a year after forming a working group to develop it.

PLAI is being designed to enable employee identities and roles defined or revoked in an authoritative logical identity system to automatically propagate to one or more PLAI-compliant physical access control systems (PACS). PLAI synchronizes physical and logical identity management and access control and standardizes functions that typically have required custom programming to achieve. PLAI now can accomplish the following:• Compatibility with PACS from multiple vendors;• Enable initial registration of an employee from an authoritative source (IT or HR

logical directory) to the PACS;• Establish role-based privileges at the authoritative source and propagates this

logical privilege data throughout multiple PACS;• Propagate the credential information (both in the form of cards or upcoming

mobile credentials) of an employee from one PACS to others, thus supporting enhanced access control at multiple facilities;

• Easily invoke and revoke physical access privileges in multiple PACS.

PLAI asserts roles defined by an authoritative source (HR or IT) so these roles do not need to be redefined in the PACS. The use of a single authoritative source by multiple PLAI-enabled PACS ensures the validity and synchronization of an employee’s physical and logical identity data.

Morpho (Safran) finalized the acquisition of Dictao, the publisher of software solutions for security and digital trust. Based in France, Dictao has 100 employees and offers solutions for strong authentication, secure online transactions, and secure archiving. The acquisition of Dictao reflects Morpho’s development strategy and confirms its leadership in the security market. The two companies’ digital identity businesses are highly complementary, from ID document management to use. Morpho will be able to offer an even more extensive range of highly secure solutions to both governments and private sector companies such as banks, insurance firms, manufacturers, etc.

Located in Bialka Tatrzanska Mountain Resort in the central Tatra Mountain region, Bania Hotel is among the most luxurious hotels in Poland.

An array of indoor and outdoor surveillance solutions is required throughout the complex. To satisfy the end user’s needs, features such as megapixel image quality, round-the-clock surveillance, intelligent IR illumination, and wide dynamic range (WDR) functionality are essential.

Bania Hotel management chose VIVOTEK products, which provide optimal cost-to-performance ratio among numerous surveillance solutions available on the market.

With the assistance of specialists from Suma, VIVOTEK’s key partner and distributor in Poland, a surveillance system was delivered, thus fulfilling the end user’s high expectations.

VIVOTEK Cameras Create a Secure Environment in Hotel Bania in Poland

PSIA Achieved Milestones in PLAI Specification

Morpho Acquires Dictao

American Dynamics’ Integrated Security Solution Safeguards Atlanta School District

American Dynamics, a Tyco Security Products brand, announced that Cherokee County School District (CCSD), located in the Atlanta metro area, has chosen its video security solutions to secure its schools and other facilities. One of the largest public school systems in the state of Georgia, CCSD encompasses 57 schools and other buildings, including 24 elementary schools, seven middle schools, seven high schools, three preschool centers, central offices, and warehouses, along with its 40,000 students and 4,500 staff.

The school district needed a surveillance solution that would enable public safety staff to monitor both live and recorded video from its facilities. CCSD selected the hybrid recording platform from American Dynamics to allow the school district to upgrade and grow its surveillance security system gradually, without completely replacing its existing analog infrastructure. Tyco Integrated Security served as the systems integrator for this project. Once the installation is complete, CCSD will be able to employ more of the surveillance system’s features and capabilities for an integrated platform across all of the district’s facilities.

Page 6: A&s international Oct 2014(trial version)

��� ��������

26 OCT 2014

Got Wi-Fi? That’s a question Magic Waters WaterPark, in Cherry Valley, Illinois, U.S., asked itself in response to growing consumer demand for public Wi-Fi accessibility. The award-winning attraction, which is managed by the Rockford Park District, is always a crowd pleasing destination so its desire to provide patrons with free Wi-Fi service was a perfect add-on to the park.

James Shaw, Systems Administrator/Communications Specialist for Rockford Park District’s IT division, was tasked with leading the project. The objective, Shaw explained, was to create an additional network throughout the park as a back-up to their aging fiber network. The installation got underway after the waterpark closed for the 2013 season. The mesh network was completed in the fall of 2013, and was put into operation during the summer 2014 season.

The network encompasses Fluidmesh1100 radios arranged in a ring formation throughout the water park with eight hop points. Each hop point also has an Aerohive AP connected only to the mesh network. Two Fluidmesh APs are configured as mesh-ends and both are located at the site’s main Cisco switch.

Another virtual local area network (VLAN) was recently added to the mesh to provide wireless bridges to pump room chemical monitors, as well as to enable network access to maintenance buildings that were not previously hardwired with networking.

Extreme Networks teamed up with Axis Communications to provide the wired and wireless infrastructure needed to deliver complete video surveillance during the 2014 Little League Baseball World Series (LLWS). Together, the companies enhanced the overall security of players and fans alike.

This year, Extreme Networks made its debut protecting the series joining Axis as it enters its fifth year. To secure 350,000 expected spectators during the 10 day event, Extreme Networks provided its gigabit Ethernet switches to form the backbone of the state-of-the-art security solution. Extreme Networks’ solutions complement the stadium’s access control network and connected more than 40 Axis IP digital video surveillance cameras throughout the complex.

Extreme Networks’ switches promote deployment simplicity of the surveillance network due to software automation through the operating system, automating key configuration, and management policy settings across the infrastructure. The Extreme Networks’ switches boast enabled network convergence, high availability and resiliency, programmable extensibility, scalability for future network growth, comprehensive security features, and high performance, high bandwidth, and non-blocking architecture.

New for the 2014 tournament, the LLWS deployed the advanced Axis’ pan/tilt/zoom cameras to manage crowd safety at the packed event. The cameras’ responsive performance and unique vantage point could help security staff to quickly scan crowds to locate lost children, track suspicious packages or vehicles, and zero into any area of concern with high detail. The Axis cameras’ open platform allows close integration with the Extreme Networks switches, and their Power-over-Ethernet capabilities assisted with the speedy installation of the wireless infrastructure required in temporary surveillance systems.

Extreme Networks and Axis Team Up to Secure the Little League World Series

Fluidmesh Solutions Make a Splash at Magic Waters Waterpark

CNL Provides PSIM to Hospital in South Africa

CNL Software, one of the suppliers in physical security information management (PSIM) software, have been chosen to provide a comprehensive security management system for a hospital facility in South Africa.

Healthcare security is facing increased violence, crime rate, and vandalism. The security challenge includes not only maintaining the safety of patients, staff, and visitors, but also protecting medicines and medical equipment and securing facilities and buildings. Mitigation of security incidents is essential as breaches can have life safety consequences, as well as capital and equipment loss, financial penalties, and damage to reputation.

CNL’s PSIM is a software-based integration and management platform, which connects disparate security systems such as security and building control systems, patient and staff interfaces, RFID patient tagging, nurse call, HR, and other business management systems. The system provides control room operators with real-time situation awareness, through a common operating picture and following an alert, alarm, or trigger.

Page 7: A&s international Oct 2014(trial version)

����������������

30 OCT 2014

The Hikvision 4K NVR supports 4K IP camera input, 4K decoding, and video output, as well as wide preview and playback in 4K resolution. The 4K NVR utilizes H.265 for video compression, compared to H.264, which extremely improves video coding efficiency, helping to save on overall storage space.

7200 series cameras use H.265 video coding compression and unique transmission technologies to transmit HD surveillance videos over lower network bandwidth. High-definition images are delivered and no image pause occurs thanks to their ultra-low code rates. Low bandwidth is able to transmit HD videos as good as wide bandwidth.

The latest coding technology enables the 7200 series H.265 HD IPC to provide users 300 percent free spaces for video footages; the 7200 series presents the same definition and recording duration as H.264 cameras, but occupies only one-third the recording consumption and footage space of normal cameras. 7200 series H.265 HD IP cameras have a low-light feature and are able to capture HD video under very weak light like moonlight.

H.265HEVC is a new generation of image compression technology that expands the capabilities for surveillance initiatives. In conjunction with the state-of-the-art advantages of HEVC, Aventura has added a litany of enhanced features which raise the bar to which the competition aspires. Aventura’s advanced imaging technology allows for minimizing compression in active areas within the scene and maximizing in peripheral areas where activity is low and/or insignificant. Decoded video can be produced with various frame rates, resolution, and quality. Aventura’s implementation of temporal and spatial scaling efficiencies is an extension of the native codec algorithm. Three unique transmissions provide for controlled access for a variety of network operating environments from LAN/WAN to mobile devices.

������������ ����������������� �������� ���������� �������������������������������������������� �������� �������

�� �� �!��������� ����������"#��$�%�&#'�$�� ���(������� ����)*)�"+$��� ���� �������� �� � ������������ ������� ���� �� ��������,)! �$#�'#�-#�����'$

� ��������.����� ������* �������/

��������+���.����+����

������������ ��+&�-�.�� ������� ���� �������/#������'#$�$����"$���� ������

�� � �����'#$�$����&-���������� ��� �'+-����0������������ ��� �'$$����

�� �1��(�������� ����. �����(� �������� �'2'+34�5�6�#���������������������$+$$&���%�7�����8�����$+$$'���%�792:8

�� �)���!5,������������/2�������. ������ �� ��15�����915�������� ���. ������ �� ������� �" � ;,���� ��� ���� ������ ������ ��� ��

� �����<;=�* �������/

��������+>�.+����

������������ �"��?�� �������7&#$���%�'#-"�8�� �'2&+�4������ �. �����5�6���� ��+&�-��@=52�A?@B�� �:�� ��/���������� 2" � ;,��� �C�������B9�� D5����� �� �)������������������ �)����. ��������� �������/�� �*���� �� ��������� �������

� �����). �����* ��������

��������+�. ������.+����

Editor’s Note: Being the successor of H.264, the current standard compression format in the industry, H.265 plays a crucial part in supporting the 4K and 8K ultra-high definition (UHD) trend in the industry since it takes only half the bandwidth and storage. A few months ago, H.265 remained a myth with no one able to predict when it would be ready to go. Now, some companies, from chipset providers to video surveillance solution providers, have overcome the challenges and officially hit the road with H.265. This issue, the a&s editorial team features the latest offerings in NVRs and IP cameras.

������������������ ��!"#��

�$#%$�$���&'�((�&�)�����*+�,�

-�,.�//�"$���� ������ �!��"!

�%����"!�������,�0� ������1�"#2�(�!��"!

Page 8: A&s international Oct 2014(trial version)

36 OCT 201436 OCT 2014

����������

One of the predominant global distributors with footprints across the world, Anixter International is a publicly traded American

company, valued upwards of US$6 billion. Now in over 50 countries around the world, dealing in local languages, local currencies, and local people, the company has a firm hold on many international locations. With several locations in China, Japan, Singapore, and Australia, “the APAC region is a growth market for Anixter’s security business,” said Bill Galvin, EVP of Enterprise Cabling & Security Solutions at Anixter.

Even though it is a relative newcomer to the world of security, only entering the industry in 2000, the fact is Anixter has always had an interest in security while already solidified in multiple other markets. As Galvin explained, “Our interest began because the security business was going through a transformation, especially on the video side, where it was shifting toward IP video systems.” He also further elaborated, “We understood that there was a fundamental change happening in the security business, where a portion of the traditional analog market was moving to IP. Anixter was in a very good position to help customers with that transformation. So in 2000, we began building our security segment all the way up to an over $1.1 billion business today.”

��3�������2������4���5����As Galvin pointed out, Anixter’s strength has been in IP video. Growing

up in the IP infrastructure timeline, he explained that with the acquisition of a company of Tri-Ed’s caliber, it will substantially enhance Anixter’s security business by opening up opportunities to have a presence across all the different markets in security and not just in IP. With the September 17 announcement of the closing of the deal, Anixter has now positioned

���

���4������ ���&��

2�������6

OnOnOn August 11, 201414, Anixter InInternatational announceced that thehey y

had d enenterered into an n agreemenent toto a acquire T T Triri-Ed, a a leaeadiding

diststriribubbutotor ofof sececurity sosolutionons s for a purchasing pricece o of US$42020

million. Causing ripples in the security indndustry, this acquisition marks a turning g point for Anixter,

as they look to expand their security segments.

������72����

�27���������

I THINK THE ACQUISITION GIVES US THE OPPORTUNITY

TO PUT EVERYTHING TOGETHER AND PROVIDE

OUR DEALERS, CUSTOMERS, AND INTEGRATORS WITH

THE BEST-IN-CLASS SOLUTIONS.

Bill Galvin, EVP, Enterprise Cabling & Security Solutions, Anixter International

Page 9: A&s international Oct 2014(trial version)

����������

38 OCT 2014

itself to further penetrate the security industry. “I think this will address one of the hurdles, which is covering the security market more broadly. I think the acquisition will really give us full capabilities across both analog and IP,” said Galvin. “With the acquisition of Tri-Ed, we can say we’re truly a full-line security distributor.”

Expanding on the acquisition of Tri-Ed, Galvin explained that the first step is to integrate the two companies to provide the best solutions for customers. Tri-Ed has a very strong, established position in the mid-market, with over 20,000 integrators and dealers, and it serves customers across a broad range of markets. From residential to the mid-market to large complex security systems, Tri-Ed has a firm grasp on the SMB sector in North America. “I think

that by combining what Tri-Ed is able to do now, with Anixter’s global IP security focused business, we create a platform to add greater value to our customers,” he said.

A FULL LINE OF SOLUTIONS

Galvin also brought up the point of Anixter’s other acquisition in 2010: CLARK Security Products, whose strength is focused on access control and door locking hardware systems. Alongside Tri-Ed’s expanded security products such as analog video, intrusion detection, and fire/burglary, Anixter now possesses a full line of security solutions where, as he put it, “It’s very complementary. As we know, security is a massive market that’s also very fragmented, and as we put all these together, we strongly feel like there’s a really good opportunity to address all of

our customers’ needs in security, across an entire broad line.”

On top of that, Anixter not only acquires Tri-Ed’s expertise and product line, but also its customer base, further invigorating the company’s existing markets and expanding into other vertical sectors. “Anixter has very little residential play today, but we think Tri-Ed’s position in it can help us understand the markets that we can bring all of our expertise and infrastructure into,” Galvin said. “I think this gives us the capability not only across video, but also across fire and burglary, intrusion, access control, and door entry. I think our opportunity is there to put all that together and provide our dealers, customers, and integrators with best-in-class solutions. It will help them further address the market and simplify service to their own customers.”

���������� ���� ������ �������� ����� ����������������� �������� ����� �������� ��������� ������������ � ������� �������� �� �� ����������������������� ������� ���� ������������� ���������������� �������� ���!� �"� � �������� ����� � ��������� ��� ������������ �� ���� ������ �������� �#�����$�������%� ���� �����&����$������� '(������������)�����*����� ���*�� ������ ���������� ��� ������������������ ����"� ���! ����������� ���� �������� ����� ������������������� ���������� ���� ���� ������������+ ���! �������������������������� ����� ����� ���������� ���������������� �� �� ���� ����,-�������$���������������� ��)������� ��� ��������� ��� ������� ������ ���������� ������+���� �� ����� ����������������� �� ������ �������!� ��� ���� ����� ���� ������ �.���'(�+�������� ���� ���������� ����� ��,/����0�����1���� ����& �� ���������� ����2����� &����������� ������������� �� ������ ���������� ������ ����)���������� ������ ���� ������������� ����������� �� ���� ����� ��3�&������ ���� �� ������������������� ����� 45 ������� ��

�������� ���� ������� ��������������������������� ������������������������� �������� ����������� � ������������� ���� ���������� ���� ������� ��������������� �� ���������� �������������������� ��������6� ��������� ������� � ����� ������ ��� ��������������� � �,%� ��������������� � ������� �� �� ����� ��

����������������� ���� ��������� ��� ���������������� ��������� �����!� ��� ���� ����7����8����1���� ����& �� ����2�� ����9'� ����������� ����-�!������3&������� ��)��������� ������ ������ ������������� ����� ����� �������������� ��������� ������� ���� ��:���������� �������!� ���������;�����+����������� �� ��� �������� ���� ��,$��������� ������������)���� ������������������ ���������������� ������ ������������������������������������� ����� ������������ ��������� ���� ������������ ������� ����������� ���� �������� ����������� ���������� � ������� ����������� ���� ����� ���������,-��������)���!� ������ �� �������� ����������� ����� ��������������������������� ��������������*�� �����,

Distribution Partners Chime in on Acquisition

Brian James, Director, Strategic Accounts, Pelco by Schneider Electric

Gordon Lang, Director, Strategic Partners & National Accounts, Hikvision USA

Rafael Madrigal, International Sales Manager, NVT

Page 10: A&s international Oct 2014(trial version)

44 OCT 2014

������� ��

We are in a new era of the video surveillance market, especially in regard to full HD (FHD)/HD transmission technology, an explosion in the

variety of FHD/HD transmission technologies. In transmitting high resolution images, FHD/HD data, there are two options in the market: raw data transmission and IP transmission based on compression.

Generally, raw data transmission is more familiar to the Asian market than the European/American market, where focus is on IP-based systems. To survive within the same video surveil-lance market, new technology must overcome its weaknesses and outdo its competitors.

At present, raw transmission technologies for analog transmissions are gaining popularity in the market. Raw transmission technologies have a strong signal characteristic

based on analog transmission and are easier to access on the manufacturers’ side. Since manufacturers are

accustomed to developing analog products over IP-based ones, this technology has become the most popular technology on the market now.

Covering all resolutions from standard definition (SD) to FHD, as well as providing longer distance than

HD-SDI but the same high quality images and transmission without latency, Analog HD (AHD), a unique transmission solution powered by Nextchip, is taking the spotlight. The core technology from Nextchip, a dedicated video processing expert, is the major reason for the technology’s success.

Due to the dilemma the video surveillance market has been in due to the cost and transmission distance of FHD/HD systems, the introduction of AHD technology provides a better solution not just to customers, but the overall market too.

������������������������Nextchip is a fabless company specialized in the design of

semiconductors. Nextchip has been developing its own core technologies like IPs and algorithms in image processing and

44 OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCTTTTTTTTTTT 20202020200000000000020000000002000000114141111444141414414414414141411144441414144141411144444444141411414444444141411144444441444444444444444444444444144414444144444414444411444

em

Hvariety of FHhigh resolutiothe market: raon compress

Generally, rmarket than ton IP-based slance marketand outdo its

At present, transmissions

transmission based on

on ta

Im

C

(SD) to FHD-SDI but thwithout latensolution pow

core technoloexpert, is the

Due to the been in due tsystems, the solution not j

�������Nextchip is

semiconducttechnologies

����� �������������

�����������������������

���������� ���������!�"�#�������$��

Page 11: A&s international Oct 2014(trial version)

45www.asmag.com

-1����� ������������ � ����������������� ����� �������� �� ����� ���� ������ �������� ���� ��������� �������� ������������ �� ������������������ �������������������������� �� ��������� ������������ ������2����<:==����&����� ��� �������� ��-1������� ������������ ��� �������������������� ����� ����������������������6���������� ����������"� �� ������� �������� ������������������'�� ����

�������������� ������� � ������� ������ �������������1(#��� �������������������������� �������� ������� ����������� ���������� ������������� ��������� ������� ����� ����

����!� � ��-1� ���� ����������� ����-1���������������� ��������������������������������������� ���������� ���������� ������ ������������� ���1(#���� ������������������������� �����������������!� �� ����� � �������� ���!� �8�� � ���� ������-1� ������� ������ ����� ��-1

������������ ����� �� ����&11(#���.-11(#���� ���� ������ ����� �������&1 �.-1���������������������� ������� ������-1�.�� ��������� �������� ������� :�� �� ��������>?5-=(/&��������=(/&@=�$��A��B5C5�.-1������ ��������� �������������� �����+��������� ����������������� ���!� ���� �� ����� � ��.-1������

TECHNOLOGIES IN AHD

optimizing them into a single chip. These technologies have been adapted in both video surveillance cameras and DVRs for 17 years. Nextchip has been focusing on the surveillance market for almost two decade. With knowledge of customers’ needs and possessing all the core technologies, Nextchip is set to impact the surveillance market as one of the top players in ISP and video decoders.

Based on these technologies and

know-how, in 2013, as the first phase of the transmission solution, Nextchip launched a new SD transmission technology, COMET (COMposite Video Enhanced Technology), an improvement

to the conventional CVBS in terms of cross color/cross luminance and H/V resolution that is shown in high frequency parts. Therefore, COMET provides marked clearer and sharper

45www.asmag.com

Uncompressed real-time and fully integrated video streams.

������������� ���������������

Page 12: A&s international Oct 2014(trial version)

%������'%���� ���

50 OCT 2014

%������'%���� ���

50 OCT 2014

Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well. Determining whether these people are who they say they are and allowing them access to critical areas or secure networks has become a major focus for end users, who can be aided by advanced technologies such as multifactor authentication.

���")�*�!+�,��-� !��).��+�������

.�!�*�����!�#�/�!�������� ������

Page 13: A&s international Oct 2014(trial version)

51www.asmag.com 51

Identity management is a growing sector. A recent Research and Markets report indicated that the industry stood at a size of US$5.1 billion in 2013 and

is expected to hit $10.4 billion in 2018, translating into a compound annual growth rate of 15.1 percent.

Growth is driven by strong demand from organizations seeking to protect premises and sensitive data from intruders. Being able to identify

people accurately is critical, especially for large enterprises that maintain thousands, if not

tens of thousands, of workers around the globe. Further, the roles assumed by workers have become more diverse. For enterprises nowadays, staff does

not just include full-time employees but also part-time workers, temp workers, and contractors. The need to effectively manage these workers and grant them access to company premises or data has therefore

spawned advanced management solutions.

“The process of managing identities and authorizations should be straightforward and user-friendly in order to manage many different

identities quickly, while at the same time decreasing the chance that human mistakes occur,” said Arjan

Bouter, Head of Sales at Nedap Security Management. “If you use temporary staff to make the most of seasonal peaks, you set (the system) so they’re only authorized to access your production facility for a specific period. When this period ends, their access rights are withdrawn automatically.”

www.asmag.com

Each level of identity verification adds a further layer of protection. Strong authentication technology significantly strengthens the fabric of the layered security.

Page 14: A&s international Oct 2014(trial version)

%������'%���� ���

56 OCT 201456 OCT 2014

����*1�"+����!.������!� *�����/�

��")�*�!+

.�!�*����!�#�/�!�From higher education to healthcare, users in different vertical markets need good identity management solutions to authenticate users and grant them access to buildings or network data. This article explores how identity management solutions are applied to different verticals.

������� ������

%������'%���� ���

Different verticals face different identity management needs. Healthcare providers, for

example, are concerned with intrusion into patients’ medical records, while corporate users demand effective management of employees who are hired or terminated. Good identity management solutions benefit different verticals in a variety of ways.

���������Healthcare operators deal

with security issues on a regular basis. These include conflicts between doctors and patients and unauthorized access to critical areas, such as X-ray rooms, intensive care units, and birthing and infant care

centers.

Page 15: A&s international Oct 2014(trial version)

%������'%���� ���

58 OCT 2014

Another huge problem facing healthcare operators is the theft of patients’ medical data. “There have been a number of breaches in recent years that have compromised millions of private patient medical records. Username and password are not enough to protect these highly sensitive documents, and a stronger form of authentication is necessary,” said Jennifer Dean, Identity and Access Marketing Communication Manager at Gemalto. “As regulatory requirements become more stringent by the day, hospital and medical office administrators are under increasing pressure to maintain data integrity and protect patient records. There is a real need for a standardized identification system that integrates physical and logical access — a solution that is secure and auditable, but that’s still easy to deploy and convenient for users.”

An emerging approach to integrate physical and logical access uses the NFC technology, which enables users to carry a smart card or smartphone with an authentication credential stored on the device’s secure element (SE) or SIM chip. “With these mobile soft tokens, users can simply ‘tap in’ to hospital facilities, VPNs, wireless networks, and cloud- and web-based applications,” said Jordan Cullis,

Head of Identity Assurance for APAC at HID Global. “Affiliated doctors who might previously have carried as many as 20 one-time password tokens will now be able to carry a single mobile soft token.”

A good visitor management solution is also needed to keep track of visitors coming in and out of hospitals. “Today’s visitor management systems enable the screening, badging, and tracking of all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods,” Cullis said. “Systems should support real-time patient feeds using Health Level 7 (HL7) integration, which ensures that no

visitor is sent to the wrong location or to see a patient that is no longer checked in.”

���%����Enterprise users maintain thousands

of employees who are spread across the globe. Keeping tabs on workers as they enter or exit companies is critical.

“One main security pitfall in the corporate environment is not collecting credentials after an employee leaves the company. This allows them access at any time in the future. By managing their identities electronically, access rights can be immediately removed without the

One main security pitfall in the corporate environment is not collecting credentials after an employee leaves the company. This allows them access at any time in the future. By managing their identities electronically, access rights can be immediately removed.

Jeremy Earles, Credentials Business Leader, Allegion

There have been a number of breaches in recent years that have compromised millions of private patient medical records. Username and password are not enough to protect these highly sensitive documents, and a stronger form of authentication is necessary.

Jennifer Dean, Identity and Access Marketing Communication Manager, Gemalto

$����� ���!������� ��� � ��� ��� ���� ��� �3��������������������������� �������������� ���� ���� �� ��������������� ������� !������ �������� �� �������� ���� �� ������������������<� � �� ��� ���������� ���� �� �����

������ ���� � ��� ��������������������������� �������� ��!�� % ������������ �������� �� �������!������� �� ���������������� ��������������!������� ��� �������������������������������� � 0����=������-���� %�� �

��������� ����2�= � -%17������ ���!����� �� ����� ��������������� ����!�������������������������� ��� �� �� �� �������� ��� ��� ��� � ��������� �������� �������������� ���������D3����� ��� ��� ���D������ �������� ���

��� ���� ���� ��� ��� ������� ��� �� ����������������������������� �!����������� ���������������� ������� ���H1������� ��� ��� ���D���� � ��� ������

�� ������ ��������� ����� ���� ��� � ������� �� � ����� �� �� ������ �� ����� �)!����,�����H/������ ��� �� ���D ���� ������� �� ��

��������������� ����� ������������������� ����������H������� ������ ��� ��� ������� ����� ���

������ ����� �������� ������� ��� ��� � �� ��������������������D1������������� ���� ��� ��������������� ������� ������ ����� ���� ��� ���:�� ���������� ���������H������� ��������� D���� �� ����� �� ���������

������������������ �� ������ ������������ ���������� ����

���������� �� ������ ������ ���������!��� �� �� ��� ��/� ������ �������������� ������ ����� ��� ��������������������� ��� � ��� �� ����� ).��� �������������� ������ �������!��� ������ ����� � ���������� ����*��� �������������+ ������ ������ ���� ����, ���0�������1���� %�� � ��������$��!� ���=�������� ���$������� 7���� �� )-���������� ������������ ���� �������������������������� ��������������� �������������������������� �!����� ��� �������� ������� ������ � ������ ���� ��� ���� ������&$&��2�"� ������+� ����� ����������� �� ���2����?��������������� �'.=���������� ��� � �����������2� ����������������������� ������ ����� ��������������� ������ ����� ��� �� �������� ������� ���������� ������ �����,

A Word on Mobile Banking and Payments

58 OCT 2014

Page 16: A&s international Oct 2014(trial version)

66 OCT 2014

��� �������,�

66666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666 OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT 2020202020202020202002020202020200202020202020202002020200200200022002201414141414141414414141411414144141414141441414141144141414466 OCT 2014

��� �������,�

�)�"�-��!��� ����*"�!.��+

FrFrFrFrFrFrFrFrFrFrFrFromomomomomomomomomomomom a a a a a a a a a a a s s s s s s s s safafafafafafafafafafeteteteteteteteteteteteety y y y y y y y y y y anananananananananananaananand d d d d d d d d d d d d d sesesesesesesesesesesesecucucucucucucucucucucucuriririririririririririritytytytytytytytytytytytytytytyty p p p p p p p p p p p p pererererererererererererererererspspspspspspspspspspspspspspspececececececececececececececectititititititititititititiveveveveveveveveveveveve, , , , , , , , , , oioioioioioioioioioioioioil l l l l l l l l l l ananananananananananananand d d d d d d d d d d d gagagagagagagagagagagagagagas s s s s s s s s s s s ininininininininininininininststststststststststststalalalalalalalalalalalalalalalallalalalalalalalalalalalalalalatitititititititititititititionononononononononononono s s s s s s ss s s s s arararararararararararare e e e e e e e e e e e amamamamamamamamamamamamamamaamononononononononononononononong g g g g g g g g g g g g g thththththththththththththe e e e e e e e e e e e momomomomomomomoomomomom ststststststststststststst crcrcrcrcrcrcrcrcrcrcritititititititititititititicicicicicicicicicicalalalalalalalalalal a a a a a andndndndnndndndndnd c c c c c c chahahahahahahahahallllllllllllllllenenenenenengigigigigigigigigingngngngngngngng e e e e e e e envnvnvnvnvnvnvnviririririririrononononononononononononmemememememem ntntntntntnts.s.s.s.s.s.s.s.s.s. T T T T T T T Thehehehehehehehehehehehehehehehe s s s s s s s s spepepepepepepepepepepepeedeedededededededededededededed i i i i i i i i i i i i i in n n n n n n n n n n whwhwhwhwhwhwhwhwhwhwhwhwhwhw icicicicicicicicicicicich h h h h h h h h h h h anananananananananananananan i i i i i i i i i i i i i incncncncncncncncncncncididididididididididididenenenenenenenenenenent t t t t t t t t cacacacacacacacacacacacacan n n n n n n n n n n n n eseseseseseseseseseseseseesescacacacacacacacacacacacacalalalalalalalalalalalalalalatetetetetetetetetetetetetete t t t t t t t t t t t t t t t to o o o o o o o o o o oo o a a a a a a a a a a a a a a a dididididisasasasasaststststererereer m m m m meaeaeaeaeansnsnsnsns t t t thahahahahat t t t t t opopopopoperererereratatatatororororors s s s s neneneneneedededededed t t t t t t to o o o o gegegegeget t t t t ininininininininfofofofofofofoformrmrmrmrmrmrmrmatatatatatatatatatioioioioioioion n n n n n quququququququququicicicicicicicklklklklklklklklklklklklkly y y y y y y y y y y totototototototototototototototo b b b b b b b b b b b b be e e e e e e e e e e ababababababababababababablelelelelelelelelelelelele t t t t t t t t t t t to o o o o o o o o o rererererererererererererereacacacacacacacacacacacacaca t t t t t t t t t t t t ananananananananananananand d d d d d d d d d d d miminininimimimizezeze d d damamamagagages. AdAdAdAdvav ncnces i in vivividedeo o tetetetetechchchchchchchchnonononononololololololologygygy a a a a a andndndndnd v v v v v v v vidididididideoeoeoeoeo c c c c conononononontetetetetetetentntntntntntntnt a a a a a a a a a a ananananananananananananananananalylylylylylylylylylylylylylylylytititititititititititititicscscscscscscscscscscscscscs h h h h h h h h h h h havavavavavavavavavavavave e e e e e e e e e e e e grgreaeat t popopotetetentntntiaial l totototo a assist oio l ananand d d d gagagas s inininstststalallations s in d detetectitingngng f f f f f fiririririreseseseseseeses, , , , leleleleleleleleakakakakaks,s,s,s,s,s,s,s, a a a a a a a andndndndndndnd s s s s s s s s sececececececececececurururururururururururururururururururitititititititititititititity y y y y y y y y yy y thththrerereatatatats,s,s,s, a a a as s s s wewewewellllllll a a as s s hehehelplplplp m m makakake e e opopoperereratatatioioionsnsns m m morororo e e efefeffifificicicienenent.t.t.t.���������� ����� ������ �����

As oil exploration moves to new regions across the world, so does the need for better monitoring of remote facilities, increased

protection against terror threats, and pipeline and leak detection monitoring solutions. Exploration and drilling security systems will be the largest segment in terms of spending and adoption followed by refineries and storage facilities. According to research by Frost and Sullivan, the global oil and gas infrastructure security market was estimated at US$19.6 billion in 2013 and will grow to $24.7 billion by 2021. Including network and cyber security, the combined oil and gas security market will reach $30 billion by 2018.

Any damage to an oil and gas facility has grave consequences. Incidents have implications on employee safety, environmental damage, cleaning costs, damage penalties, equipment replacement, and the list goes on and on. This becomes even more challenging when considering the nature of these installations. There are hundreds of potential breach points for leaks and damages: numerous valves and pumps, meters upon meters of pipes. Even within the facility, environments are not the same. A refinery for example will include various types of oil, transported at different temperatures and pressures, from ambient temperatures and pressure up to 130 bars at 100°C.

Page 17: A&s international Oct 2014(trial version)

67www.asmag.com 66777777777766666666777777777www w.wassmaag.g.comg.g.com 67www.asmag.com

Page 18: A&s international Oct 2014(trial version)

���������������������

74 OCT 201474 OCT 2014

Casino get thousands of visitors on a daily basis, and with people bustling in and out of the premises,

it gets hard to keep track of what is going on. Cameras are employed to cover every inch of the property to ensure there is no unlawful activity or accidents. However, with all the video coverage, it is impossible to expect humans to not miss a single frame that could lead to suspicious activity when monitoring the casino.

����������� ��������������

Although casinos have gaming regula-tions that are implemented for safety measures, law enforcement employed to fight crime, and surveillance cameras on every gaming table, there are still people out there who believe rules are there to be broken. According to the Nevada State Gaming Control Board, approximately 500 people are arrested each year for attempting to cheat at casinos in the state of Nevada, U.S., and out of the total number of arrested, nearly a third of those arrests are casino employees. This staggering fact has urged casinos to be more aware of their security, as even insiders cannot resist the lure of “easy money.”

������������� ������� ����

Perhaps it is because of the large amounts of cash situated on the premises, but casinos have always been a natural target for criminal activity. Some of the most common threats in casinos are cheating, theft, and fraud. In a gaming facility constantly humming with activity, it is impractical to only rely on the security team to be able to identify all potentially suspicious activity. In the past, most casinos encountered various crimes even under conditions where video surveillance cameras were installed. Insufficient resolution to

������������� ������� ����

Perhaps it is because of the large amounts of cash situated on the premises, but casinos have always been a natural target for criminal activity. Some of the

re most common threats in casinos arefraud. In a gamingcheating, theft, and fraud. In

facility constantly humming with activity, f iliit is impractical to only rely on the security team to be able to identify all potentially suspicious activity. In the past, most casinos encountered various crimes even under conditions where video surveillance cameras were installed. Insufficient resolution to

74

����������� ���������������������������������������������������������������������

OCT 2014

CASINO VCAXSAY NO TO WRONG DOERSEveryone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.

���������������������

���������

Page 19: A&s international Oct 2014(trial version)

75www.asmag.com 777777777777777777777777777777777777777777777777777775555555555555555555555555555555555555wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww.w.w.wwwwaasasasa mmmmmamm g.com 75www.asmag.com

Page 20: A&s international Oct 2014(trial version)

���������

82 OCT 2014

Resorts World Casino New York City is New York’s first world-class gaming casino connected to the famous

Aqueduct racetrack in South Ozone Park, Queens, and has played host to some of Thoroughbred racing’s biggest

heroes over the years. With over 400,000 square feet of gaming facilities and a 70,000 square feet event space

for big-ticket events, Resorts World Casino employs over 1,300 people and sees an average of 20,000 guests

daily, utilizing 6,500 parking spots. Resorts World New York has implemented state-of-the-art security and

surveillance technologies to ensure the safety and security of their facility, guests, and personnel.

�������������� ����������������������������������

� ���������� �����Since opening its doors in October 2011,

Resorts World Casino continues to have solid growth and record revenues. Unfortunately, with success also comes a number of persistent security issues from both insiders and outsiders. The casino handles numerous security incidents every single day, including common incidents such as theft, unwanted banned patrons, personal injuries, vandalism, etc. Even a routine incident can often take an inordinate amount of manpower and, if not handled in a timely manner, can compromise business operations and services and potentially cause exposure to liability. The process of recording, tracking, and reporting was a manual process that inhibited the investigation and reporting process. Information was inconsistent and not readily retrievable, and media files were often not associated with an incident. Compiling meaningful reports was a lengthy and onerous task, making it difficult to correlate events to identify areas of risk and optimize staff allocation. Jason Arnett, Director of

�"#"$%&'%"($%�)"�*+,-$*"

�#*#.$/$*"�01"$/1�$+2)$

�$1&)"1�&)3-�#1,*&�$4�&)5

���������

% ����� �������� ���������������������������������������������������&����'�������##����(����������������������������������������������� �����"����������������������#��������� ����������$&����'�������������������������������������������������������������������� ���������������������������������"������#������������P� �������������������#�6�%�� ��#������IK�������������������#������������#����#������������������������� ������������� ����������������� �� ���� �������� ���������������������������%�����

P� �&��������������#�������������������#�����JI������������� �����'�� �� ����+�����������������#����������#������� ��������������������� ��������#����������������������������������#������������

P� ������������������������6��������������������������������������������������� ������#���������#�������������#�������� ���������������������#����

THE BENEFITS

Page 21: A&s international Oct 2014(trial version)

83www.asmag.com

Surveillance of Resorts World New York initiated the project to automate their security reporting, mitigate risk, and improve efficiencies. Arnett looked to iView Systems’ gaming experts for an integrated security and risk management solution to automate their incident reporting, daily log, officer dispatch, and lost and found functions, as well as to identify and track employees and visitors.

� ��������With iView Systems’ experience in

the gaming industry and Resort World sister casino in Singapore already using iView Systems technology for security and surveillance reporting, Arnett looked to Tony Day, Senior Account Executive for iView Systems, to map out their security and surveillance reporting needs. “They required an incident reporting and risk management system that would allow them to document all daily activity and incidents, along with the ability to include supporting evidence such

as media files or individual reports. Additionally, Resorts World required the capability to track all personnel and vehicles, as well as manage and control details such as lost and found items, visitor management, employee audits, and document disputes, and provide player analysis by surveillance,” Day said.

) *�&�� ��&+ �,

In addition to tracking and reporting incident and events, Resorts World has implemented a layered approach to

detect, deter, and resolve issues in a proactive manner.

iView’s visitor management system checks in and monitors contractors and vendors or suppliers’ access to the property. With so many suppliers coming and going at all hours, the system provides detailed logs of visits and screens against watch lists, which aides with access, accountability, and compliance. “We’re able to pre-register visitors and ensure contractors and suppliers are in compliance with licensing and insurance regulations

Resorts World Casino New York is New York’s first world-class gaming casino. With over 400,000 square feet of gaming facilities and a 70,000 square feet event space for big-ticket events, Resorts World Casino has implemented state-of-the-art security and surveillance technologies to ensure the safety of their facility, guests, and personnel.

����#�����=�QDN�DFN�� ��P� ������������������������#������DKE�������������P� ������������������������6�������#������������������������������������������������������������������������!����������� �� ����������������������������������������������� ���������������������������#�����������������

P� �&���������6�&������#������R������� ���������������������� ����������������������������,������������������������#�����-'.����#��������������������������#�����������������������������������������1�&?��������"�

P� ���#���������� �����������������������������������������������������������������������

P� �$���!�������������������������������������?�A������ ������������������������������#�� ���������� ��������� ���������������������� ��

P� �(������������#��%�������������������������������������

)1�����������,�������������������#��������������������%����� �*�������S�����������-�����������������������.������1����>� �T����)? ��������#���������� �������������������������� ������������������������!�����������#��������#��

���%�� ��#���������������������������������#�� ���������������������1�� ������������������������������������������������G����������������*)���������� ����������������������������� ����������������#�

�������� ���#������������������ �������� ����������������������������� �+����#���� ����� ���� ���������������������#������������ ��� ������������ ������������� �������������������� �����,����������#������*

Page 22: A&s international Oct 2014(trial version)

86 OCT 2014

�������������

Ever since 960H and HD-SDI emerged in 2011, video surveillance players have been trying to find

solutions that enhance the quality of CCTV, which remains the mainstream surveillance technology. Analog cameras are inexpensive and easy to install, and

they still dominate the market with 70 to 80 percent of market share. However, IP cameras are threatening the very existence of analog players, who are seeing a steady revenue decline. Against this backdrop, analog players seeking to survive have put intensive efforts into the R&D of

high-resolution HD-over-coaxial solutions. HDCVI, HDTVI, ccHDtv, and AHD are the products of those efforts.

Any HD-over-coaxial solution, be it 960H, HD-SDI, HDCVI, HDTVI, AHD, and ccHDtv, must be easy to use over the end user’s legacy coaxial cable. HD transmission

�3",/#"$�#""3$'&)�2)6,6#370�*#3&.�#*2'#+"2)$)1

�%&6$)%�&#8,#3�

The overarching view in the security industry right now is that IP, which employs a network infrastructure and offers HD video, will one day replace analog solutions, which have defined video surveillance for half a century. For analog players, who are seeing declines in sales and revenue, they must find ways to regain their former dominance in the industry. HD-over-coaxial solutions, which deliver HD video over users’ existing coaxial cabling, represent their ultimate battle for survival amidst the IP invasion.

����������

Page 23: A&s international Oct 2014(trial version)

87www.asmag.com

�������������

4 The backend equipment must be compatible with the 960H format, and future compatibility with analog splitters and matrix systems must be considered;

5 HD-over-coax must be easy to use and operate and allow settings on both frontend and backend equipment;

6 Any solution must have low cost and high quality.

There are HD-over-coaxial DVRs that can support both 960H and 720/1080p. These are called hybrid HD DVRs. There are even HD DVRs that are bolstered by Intersil’s decoder chip and the TCP/IP interface to support 960H, 720p/1080p, and IP signals. These are called Tri-brid HD DVRs.

���������������������������������

HDCVI, HDTVI, and AHD share one thing in common: as opposed to 960H that uses the CCD sensor, HDCVI, HDTVI, and AHD use the megapixel-level CMOS or

Exmor CMOS sensor. The purpose is to capture HD images at the source level. Among manufacturers of CMOS sensors are Sony, Omnivision, Pixelplus, and BYD. The formation of images differs slightly according to brand.

Another similarity as far as components are concerned is the use of an image signal processor (ISP) in conjunction with the sensor. This device ultimately determines the final image displayed by HDCVI, HDTVI, and AHD solutions. The chipset could be integrated into the sensor module or into the transceiver at the backend of the HDCVI, HDTVI, or AHD camera. Image signal processors, whose manufacturers include Sony, Fullhan, Nextchip, and Eyenix, process and enhance images formed by the sensor. As ISPs of different companies are designed differently, they have different ways of handling backlight compensation, WDR noise reduction, and the 3As, namely auto white balance, auto exposure, and auto focus.

One final thing that the solutions have

Darius Lukocius, Director of Sales, EMEA, OT Systems

Fiber Links Boost HD-Over-Analog Solutions

should be achieved using 5C-2V (RG-59U) or 3C-2V (RG-6) coaxial cable without quality loss, and the traditional distance barrier of 100 to 200 meters must be overcome. The solution must incur no extra cost for installation or upgrade, resist quality loss over a long distance, and enable easy upgrade to megapixel-level HD surveillance. Further, it must be high in quality and competitive in price to gain a stronger foothold in vertical markets.

In summary, for a solution to be called HD-over-coaxial, six basic requirements must be met:

1 It must have high video clarity and color separation, as well as high signal filtering, noise reduction, and image restoration capabilities;

2 As HD-over-coax is claimed as a breakthrough technology, it must be able to transmit signals for a longer distance over existing coaxial cable;

3 The solution must not be subject to latency, compression-related quality loss, or any compromise to video quality;

������4-!���!��,�����������������������������������HNN��������� ������������#�����������%������������������������������������� �������� ����4-!�-&� ��������� ����!&7���#���

��������������������������������������#����)������������������� ����������������������#� ���4-���������# ��������� �*�����-����A���������-�����������������0(0�������� ������T������ ����������#������������������ ��������

����������������� ���������4-!���!��,����������������������#�4-�'&��4-$'&��� ��������������� ������������� ��������������������#���������������4-$'&������������������� ��#�������������������������HNN��������������#����A�������������#�

������������������������������������������������������������������������������������������������������������������������

4-��������)4� ����� ���������������������������������������������#�����������#������������ �����������������# ����������!�� ������������������������������# ������������������������������������#�����������������*��������1���������������#�4-!�-&�

������������ ��������� ����� ��� �� �� �������������#���)������4-!�-&���������� ������ ����� ������������������U�D�GKH�9�������E�MJ�9����U� �����������#�4-!�-&�������������������������������������������� �*�A�������������)�����������,���������������������������4-!�-&���������������������������������� ���������������������������������������#��!����������������������������������*

Page 24: A&s international Oct 2014(trial version)

101www.asmag.com

Next Issue

Companies in This Issue

Product Exploration

RFID

Vertical Market

HEALTHCARE

Industry Report

SECURITY 50 & INDUSTRY TRENDS

Intelligent Video Solution

AIRPORT/SEAPORT

Special Feature

VSaaS/ACaaS/SaaS

Products of the

Month

• AVENTURA TECHNOLOGIES

• HIKVISION DIGITAL TECHNOLOGY

• ZNV TECHNOLOGY

News Feature

• ANIXTER INTERNA-TIONAL

• HIKVISION DIGITAL TECHNOLOGY

• NVT• PELCO BY SCHNEIDER

ELECTRIC

Product

Exploration

• ALLEGION• AMAG TECHNOLOGY• BRIVO LABS• GALLAGHER• GEMALTO• HID GLOBAL

• HUNDURE TECHNOLOGY

• NEDAP SECURITY MANAGEMENT

• SECURENVOY

Intelligent Video

Solution

• DVTEL• HIQVIEW• VIDICORE• HONEYWELL SECURITY

Vertical Market

• BOSCH SECURITY SYSTEMS

• EVITECH• EX-SIGHT• IOMNISCIENT• MSL GROUP• OSPREY INFORMATICS• PELCO BY SCHNEIDER

ELECTRIC

Page 25: A&s international Oct 2014(trial version)

ADVERTISER INDEX *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

SURVEILLANCEPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL21 3S VISION IP CAMERA / NVR / VIDEO SERVER TAIWAN [email protected] AAEON TECHNOLOGY INC. NVR / FIRE WALL TAIWAN [email protected] AIMETIS CORP. SOFTWARE CANADA [email protected]

15 AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS SWEDEN [email protected]

31 BOSCH SECURITY SYSTEMS CCTV GERMANY [email protected]

32, 33 CNB TECHNOLOGY INC. CCTV KOREA [email protected]

37 COMMAX CO., LTD. SURVEILLANCE KOREA [email protected]

BARN DOOR, INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected]

8 DYNACOLOR INC. IP CAMERA / NVR TAIWAN [email protected] FOCTEK PHOTONICS, INC. LENS CHINA [email protected]

79 FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER CHINA [email protected]

9 GKB SECURITY CORPORATION IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN [email protected]

5 HDPRO CO., LTD. CCTV KOREA [email protected]

BACK COVER HIKVISION DIGITAL TECHNOLOGY CO., LTD. DVR CHINA [email protected]

48,49 ICATCH INC. DVR TAIWAN [email protected]

FRONT COVER MERIT LILIN ENT CO., LTD. IP CAMERA / NVR TAIWAN [email protected]

6 MICRO DIGITAL INC. CAMERA / IP CAMERA / HD-SDI CAMERA / DVR KOREA [email protected] MINTRON ENTERPRISE CO., LTD. CAMERA TAIWAN [email protected] NEXTCHIP CO., LTD. CHIP KOREA [email protected]

81 OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER CHINA [email protected]

INSIDE BACK COVER PANASONIC SYSTEM NETWORKS CO., LTD. DIGITAL SURVEILLANCE JAPAN ---23 QNAP SYSTEMS, INC. NVR / VMS TAIWAN [email protected]

69 RICOM LENS CHINA [email protected]

2 RIFATRON CO., LTD. DVR KOREA [email protected]

93 SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING CHINA [email protected]

64, 65 SHENZHEN SUNELL TECHNOLOGY CORPORATION CAMERA CHINA [email protected]

25 SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected], 35 SHENZHEN ZNV TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] TAMRON CO., LTD. CAMERA JAPAN [email protected] TVLOGIC CO., LTD. DVR KOREA [email protected] VIDEOTEC S.P.A. IP CAMERA / SOFTWARE /VIDEOSERVER ITALY [email protected]

19 VIVOTEK INC. IP CAMERA / SOFTWARE / VIDEO SERVER TAIWAN [email protected]

3 WEBGATE INC. DVR KOREA [email protected]

61 ZHEJIANG DALI TECHNOLOGY CO., LTD CCTV CHINA [email protected]

ACCESS CONTROLPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL57 FINGERTEC WORLDWIDE SDN. BHD. FINGERPRINT MALAYSIA [email protected]

55 GIGA-TMS INC. RFID MODULE / LOCK / READER TAIWAN [email protected] LI SHYANG TECH CO.,LTD ELECTRIC LOCKS TAIWAN [email protected] SEWOSY ELECTRIC LOCKS FRANCE [email protected]

41 SIEMENS ACCESS CONTROL SWITZERLAND -17 SUPREMA INC. FINGERPRINT KOREA [email protected]

79 UWC ELECTRIC (M) SDN. BHD. ACCESS CONTROL MALAYSIA [email protected]

59 VOIM TECHNOLOGIES INC. FINGERPRINT KOREA [email protected]

INTRUSION ALARMPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL101 SICURIT ALARMITALIA S.P.A. ALARM ITALY [email protected], 73 ZENITEL NORWAY AS ALARM NORWAY [email protected]

OTHERPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL91 ICPDAS CO., LTD. SWITCH TAIWAN [email protected]

28, 29 PIXELPLUS CO., LTD SEMICONDUCTOR KOREA [email protected]

81 SCENE ELECTRONICS (HK) CO., LTD. ILLUMINATOR CHINA [email protected]

12, 13 SONY CORPORATION DSBG. SYSTEM LSI DIVISION SEMICONDUCTOR JAPAN -