a&s international dec. 2012 (trial version)

81

Upload: messe-frankfurt-new-era-business-media-ltd-taiwan-branch

Post on 24-Mar-2016

230 views

Category:

Documents


10 download

DESCRIPTION

The Leading International Security Magazine for Professional Buyers.

TRANSCRIPT

Page 1: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

M00A.pdf 1 2012/11/30 上午2:44

Page 2: a&s International Dec. 2012 (Trial Version)
Page 3: a&s International Dec. 2012 (Trial Version)

F00D.indd 1 2012/11/29 上午3:02

Page 4: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F00B-001.pdf 1 2012/11/29 上午2:57

Page 5: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F00B-001.pdf 2 2012/11/29 上午2:57

Page 6: a&s International Dec. 2012 (Trial Version)

F002.indd 1 2012/11/29 上午2:40

Page 7: a&s International Dec. 2012 (Trial Version)

F003.indd 1 2012/11/29 上午2:40

Page 8: a&s International Dec. 2012 (Trial Version)

F004.indd 1 2012/11/29 上午2:38

Page 9: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F005.pdf 1 2012/11/29 上午2:47

Page 10: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F006.pdf 1 2012/11/29 上午2:46

Page 11: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F007.pdf 1 2012/11/29 上午2:45

Page 12: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F008.pdf 1 2012/12/1 上午12:25

Page 13: a&s International Dec. 2012 (Trial Version)

F009.indd 1 2012/11/29 上午2:41

Page 14: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F010.pdf 1 2012/11/29 上午2:55

Page 15: a&s International Dec. 2012 (Trial Version)

F011.indd 1 2012/11/29 上午2:50

Page 16: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F012.pdf 1 2012/11/29 上午2:50

Page 17: a&s International Dec. 2012 (Trial Version)

F013.indd 1 2012/11/29 上午2:49

Page 18: a&s International Dec. 2012 (Trial Version)

14 DEC 201222 www.asmag.com 22

COMPARISON OF PHYSICAL SECURITY PENETRATIONBY MAJOR REGION 2006 & 2012

2012

North America

2006

14.11 Product Sales/Capita $USD47,000 GDP/Capita

E.U. (7)12.08 Product Sales/Capita $USD39,740 GDP/Capita

11.50 Product Sales/Capita $USD42,224 GDP/Capita

China1.53 Product Sales/Capita

4,170 GDP/Capita

2.40 Product Sales/Capita $USD6,120 GDP/Capita

Rest of Far East & S.E. Asia1.90 Product Sales/Capita $USD

9,000 GDP/Capita

14.81 Product Sales/Capita $USD49,340 GDP/Capita

2 Product Sales/Capita $USD9,800 GDP/Capita

Dec 2012

Viewpoint

Vertical Market

product exploration

IMF projections for the rate of GDP growth across advanced countries in 2012 is 1.4 percent while the world market for physical security systems grew by 6 percent.

How can you tell if video surveillance looks good or bad? While there are specs such as frames per second

and aperture, the final image quality is judged by how pleasing it is to the human eye.

90

The Security Industry Restructures to Meet New Challenges 26

Secured Airport

Terminals for

Safe Landings 36

Every day, airport operators are faced with the daunting

responsibility of ensuring process quality while guaranteeing

the security of passengers, personnel, goods and infrastruc-

tures at the same time. The complex nature of the various

subsystems, processes and fulfilling official regulations require

deep-seated knowledge and dynamically flexible management

of the entire airport operations. a&s takes a look at how

segments of terminals are secured, along with their current

challenges and future trends.

Verification Software Benchmarks Surveillance Performance

Video Quality

How to Select the Right Video Quality

Verification Software

88

M014-016.indd 14 2012/11/29 上午12:22

Page 19: a&s International Dec. 2012 (Trial Version)

F015.indd 1 2012/11/29 上午2:48

Page 20: a&s International Dec. 2012 (Trial Version)

16 DEC 201222 www.asmag.com 22

86

Special Feature

network ManageMent

30The Value of Network Assessment, Planning, Design and ExecutionVideo is critical and it is even more critical to get it right. Bandwidth optimi-zation is not limited to mere tweaks to camera settings. Closer collaboration between IT department, system integrator and surveillance operator is more important than the old days of CCTV.

46

Dec 2012

Upheavals in Security2013:

With 2012 behind us, the focus is now on the year ahead. A 2013 preview undoubtedly requires a review of 2012. In this section, a&s sums up the storms of the security industry in 2012 and peeks into the prospects of clear skies in the upcoming year.

52 Security Giants Preview 201358 EMEA Moves On in Different Paces70 Russia: The Bear Awakens72 Mature American Market Experiences Modest Growth76 Latin America Kicks Off 80 Asia Surges Ahead in 201384 China: The Security Dragon Roars In86 India: The Elephants Stomps into the Security Market

58

14 Contents 18 Editor’s Note 20 Corporate News 20 Market Observer

102 Show Calendar 104 New Products110 Companies in This Issue

M014-016.indd 16 2012/11/29 上午12:22

Page 21: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F017.pdf 1 2012/11/29 上午2:25

Page 22: a&s International Dec. 2012 (Trial Version)

18 DEC 201222 www.asmag.com 22

It is now reaching the end of 2012. It might be a little tough to give a very positive comment on the security industry of 2012, due to the sloppy global economy and lack of major technology breakthroughs. The security markets in different geographic regions also grew quite differently and the growth rate for each country was more or less affected by its economic development. Hence, in this issue, we interviewed several industry experts in the regions of EMEA, Americas and APAC to get their forecasts for the next year. What impressed me a lot are people’s viewpoints toward “growth” in the DACH market. People in the DACH region don’t like fast growth, but prefer stable and long-term growth instead. Fast economic growth always brings a certain level of disorder to the supply and demand in the market, which explains why the DACH market tries to avoid fast growth, but strives to maintain healthy growth despite the recession.

The regions of Eastern Europe, Middle East, Latin America and APAC shed a promising light of growth, compared to other regions in the world. The drivers are mostly from government investments and the growth rates usually coincide with their national GDP growth. Other than that, we can also see some international events driving security demands — the upcoming 2014 FIFA World Cup and 2016 Summer Olympics in Brazil, the 2013 Universiade in Kazan, and the 2014 Winter Olympic and Paralympics Games in Sochi.

Many industry experts forecast that next year the market will still continue to consol-idate, which means more companies will be acquired by others or even disappear entirely. In 2013, the world security market might seem a little gloomy and uncertain, but it provides a good opportunity for a “healthy” company to stand out.

Hence, it will be much easier to conclude with some key technologies and products for future growth, such as VSaaS for SMB sectors, biometrics for high-security verticals and the migration to IP — hybrid, HD-SDI and full-IP technologies. How security devices help increase business efficiency in different vertical markets will also definitely be a trend. For example, in this issue’s Product Exploration, we explored “Video Quality Verification Software” in VMS or VCA. The benefits it provides include saving time and maintenance expenses, while achieving higher security.

Jill [email protected]

YearlY review: what is next for 2013?

EDITOR'S NOTE

Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shih General Manager Editorial General Press [email protected] Lai editor in Chief [email protected] Chang senior Consultant [email protected] Wang reporter [email protected] Fann reporter [email protected] Phillips reporter [email protected] Wang reporter [email protected] Chien Coordinator [email protected]

Art Design

Gaven Lee executive Designer [email protected] Chang Designer [email protected] Wu Designer [email protected]

Circulation & Subscription Collins Yuan Group Manager [email protected] Shih Coordinator [email protected]

Corporate Management

Juihui Lin assistant to [email protected] Managing Director Thomas Pin account Manager [email protected] Lee it Manager [email protected]

asmag.com Hayden Hsu web editor in Chief [email protected] Wu assistant sales Manager [email protected] Kang assistant sales Manager [email protected]

Secutech & Events (Overseas) Echo Lin Manager [email protected] Chen Project Manager [email protected] Chang assistant Manager [email protected]

Secutech & Events (Domestic) Veronica Chen Group Manager [email protected]

International Advertising [Headquarters] Joanne Wu assistant sales Manager [email protected] Kay Yang operation officer [email protected] Fang Coordinator [email protected] Chen Coordinator [email protected] Lee assistant [email protected]

[Branches & Representatives] Bobbie Ferraro Usa/Canada [email protected] Pattuelli europe (italy) [email protected] Ilkan europe (turkey) [email protected] Consolos europe (U.K.) [email protected] Hadzic southeast europe [email protected] Gandhi india [email protected] Shen China [email protected]. C. Suh Korea [email protected] Komori Japan [email protected] Thu Ha vietnam [email protected]

a&s International, published by Messe Frankfurt New Era Business

Media Ltd., is a monthly professional publication for channel players

in the worldwide electronic security industry since 1997. It updates

importers, distributors, OEM/ODM searchers, system integrators

and other product purchasers on product sources and identifies

developments in CCTV, Digital Surveillance, Access Control,

Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

Automation and other fields relevant to electronic security.

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, TaiwanPhone/886 2 2659 9080Fax/886 2 2659 9069Website/www.mfnewera.com

Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Taiwan, a&s Solution and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers.Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

Copyright© 2012 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

ISSN 1997-6267中華郵政北台字第1571號 執照登記為雜誌交寄

For changes of address or subscription problems, contact us at [email protected]

M018.indd 18 2012/11/30 上午12:46

Page 23: a&s International Dec. 2012 (Trial Version)

emerald™ is a multi functional intelligent access terminal that is revolutionising the security industry.

With its sleek design and state of the art custom LCD touch screen, emerald is a powerful card reader and controller in one, featuring fully integrated Voice over IP (VoIP) intercom and a range of Remote Applications that provide a whole new multifaceted access control experience. emerald uniquely opens

emerald™ – The industry’s most multifunctional intelligent access terminal.

Visit us at Intersec Hall 4, Stand 205C.

IP Reader & Controller Remote Applications

Intelligent Touch Terminal

VoIP Intercom

For more information contact us on: T: +44 (0)28 9045 6767 E: [email protected] or visit us at www.cemsys.com/emerald

© 2012 Tyco Security Products and its Respective Companies. All Rights Reserved.

emerald

C

M

Y

CM

MY

CY

CMY

K

F019-CEM.pdf 1 2012/11/30 上午12:59

Page 24: a&s International Dec. 2012 (Trial Version)

20 DEC 201222 www.asmag.com 22

Corporate News

Suprema Wins Mexican e-Passport Project

Suprema, a provider of biometrics and ID solutions, announces that the company has won a nationwide electronic passport project of the Mexico Government. The project, steered by Secretaria de Relaciones Exteriores (SRE, Ministry of Exterior) of Mexico, is aimed to develop a passport issuing system for 2.7 million electronic passports across all 32 states in Mexico, including the Federal District of Mexico City.

With the initial shipment, Suprema has supplied over 500 units of biometric and passport issuing devices. Furthermore, SRE has a plan to expand this newly-developed electronic passport issuing system to its overseas Mexican embassies and newly opening offices in its domestic regions.

Suprema’s fingerprint live scanner, which captures 4-finger slaps and two-thumbs, will replace SRE's existing single-finger readers to improve capturing speed and image quality of fingerprints. In addition, the new passport reader provides a higher level of security on issuance of electronic passports and the fingerprint scanner enables biometric sign-on using pre-registered fingerprint at SRE's nationwide passport issuance stations.

Panasonic announced that its Board of Directors decided to conduct mergers where Panasonic System Solutions Japan (PSSJ), a wholly-owned consolidated subsidiary of Panasonic, will absorb Panasonic System Networks (PSN), a wholly-owned consolidated subsidiary of Panasonic, and Panasonic System Solutions Infrastructure (PSSIS), a wholly-owned subsidiary of PSN. PSSJ mergers are expected to take effect on Mar. 1, 2013.

It was also decided that the mobile phone base station business of Panasonic Mobile Communications (PMC), a wholly-owned consolidated subsidiary of Panasonic, will be transferred, through a corporate split (PMC Station Business Transfer), to the newly merged company after implementation of PSSJ mergers. At the same time,

the mobile phone terminal business of PMC will be transferred to a new mobile phone terminal business company which will be newly incorporated through a corporate split of PMC (PMC Terminal Business Transfer). Then, Panasonic will absorb the remaining PMC (having only a function to hold and manage its assets) through a merger (PMC Merger) with an expected effective date of Apr. 1, 2013.

Panasonic aims for expansion of the solution business through unification of several functions by integrating PSN and PSSIS with PSSJ through the merger. Furthermore, Panasonic will seek improvement of its development capability and enhancement of its business capability, by integrating the PMC's mobile phone base station business.

Analog Surveillance Equipment Accounts for 87 Percent of Consumer Market, IMS Says

Analog security cameras accounted for 87 percent of total camera shipments in the consumer and DIY video surveillance market, according to a recent market report from IMS Research, part of IHS. However, unlike the professional market, the consumer market is not predicted to see a significant revenue transition from analog to network video surveillance equipment in the next five years.

This is for two main reasons. Firstly, in a highly price-sensitive market, consumer network cameras are on average, double the price of analog cameras. Secondly, many of the major suppliers to the consumer market are primarily focused on analog equipment and have comparatively small ranges of network products.

Despite the difficult retail climate, the consumer market for video surveil-lance equipment has continued to perform well, with double-digit growth forecast for both analog and network product categories.

“Many retailers stocking video surveillance equipment realize it is a growing category that has not yet reached saturation. The faster growth seen in network equipment has not cannibalized sales of analog equipment; there is still organic growth in both product lines. For standard multiple camera installations, analog offers a cheaper solution complete with many of the functions available from network equipment. Analog bundles will remain fit for purpose for many consumers in the future.” concluded Josh Woodhouse, Market Analyst and report author.

Panasonic to Reorganize Systems & Communications Company

US$1.6 Billion

US$364.4 Million2009

2016

Analog security cameras account for 87% of total camera shipments.

$377 million

$35.4 million

2011 2014

$918 million

2016

Analog

IP

2014

Anticipated to reach US$10.02 billion by 2014

Analog security cameras account for 87% of total camera shipments.

Total Camera Shipments in Consumer and DIY Surveillance Market

Source: IMS Research

M020-022.indd 20 2012/11/29 上午12:24

Page 25: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F021.pdf 1 2012/11/29 上午2:27

Page 26: a&s International Dec. 2012 (Trial Version)

22 DEC 201222 www.asmag.com 22

Corporate News

UK Youth Care Facility Protects Its Premises with CEM/Tyco Platform

CEM Systems, part of Tyco Security Products, announced that Aycliffe Secure Center, provider of comprehensive secure care facilities for young people, has chosen CEM's latest security management system and biometric technologies to help protect and secure its premises. ADT, a European supplier of electronic and fire solutions, success-fully installed and managed the full end-to-end deployment of the solutions.

The crux of Aycliffe's business is to provide a safe and secure environment for its young residents who are between the ages of 11 and 17. It offers high quality, secure accommodation, as well as education and assessment prior to the reintegration of adolescent individuals back into the community.

ADT worked closely with CEM and Aycliffe to ensure the best solution was installed to match Aycliffe's specific business requirements. CEM system was chosen because it is a powerful and fully integrated security management system, ideal for securing large facilities such as Aycliffe, offering powerful access control, alarm processing, photo badging and integration to third party systems.

Verint Systems announced that it is leading and providing key technologies to the first Total Airport Security Solution (TASS) proof-of-concept at Heathrow in London. TASS is comprised of a multi-level video and situation intelligence offering specifically designed to help airports advance their threat detection capabilities.

Verint, along with several key partners from leading European technology companies, launched the field testing of the TASS prototype in October 2012. During the trial, three pre-identified security threat scenarios were tested, allowing members within the

airport community to observe and evaluate the TASS system. Part of the Seventh EU Framework Program, TASS is a four year

project that is expected to run until March 2014. The TASS consortium is led by Verint and composed of 20 leading European technology companies, research institutes and end-user organizations. Heathrow security officials will continue to conduct several simulated scenarios testing the system’s functionality and interoperability with the integrated technologies.

North Carolina Hospital Adopts Iris Recognition for Patient Safety, Record Integrity and Fraud Prevention

As part of their concerted focus on patient safety, preventing duplicate medical records and overlays and eliminating medical identity theft at the point of care, Hugh Chatham Memorial Hospital has adopted a multi-biometric patient identification system with iris recognition as the preferred modality. The system was launched in the Outpatient Admissions and Radiology departments with future plans for expansion to the emergency room and physician practices.

This multi-modal biometric patient identification system supports fingerprint, finger vein, palm vein, iris and face recognition. M2SYS Technology, the developer of this system, brings a decade of diverse biometric technology experience to the healthcare industry.

"For those who are still unaware of biometric patient identification systems, this is the time to educate yourself on how this technology can be leveraged to raise patient safety levels, prevent duplicate medical records, eliminate medical identity theft and lower hospital liability,” commented Mizan Rahman, Founder and CEO of M2SYS Technology. “We are at a critical juncture right now in healthcare where hospitals and medical facilities need to completely understand the technology available for patient identification and how it actually works. I am very pleased that we are able to help Hugh Chatham Memorial Hospital enhance their patient safety initiatives.”

Verint Participates in Launch of "Total Airport Security Solution" Field Trial at London's Heathrow Airport

Aero-Dienst Protects Hangars with Panomera

Aero-Dienst has provided its customers with an extensive range of services in business-related aviation for over 50 years. This includes maintenance and operation as well as purchase, sales and management for business jets. Almost 300 employees look after the special requirements of their customers. “We intend to afford our customers the highest level of security when they entrust us with the care of their jets,” declares Managing Director Martin Bauer.

Accordingly, Aero-Dienst was searching for a video surveillance system that would meet its needs — leaving nothing to chance in the process. None of the test configura-tions satisfied the company’s requirements, until the Dallmeier Panomera came into the picture.

Unlike conventional HD and megapixel cameras, which only have one lens, Panomera functions with multiple lenses, each with a different focal length. With this novel sensor concept, surveillance can be ensured even for extremely large areas, at the highest possible resolution, to the farthest background of the area of coverage.

Two Panomera systems were installed in each hangar, in opposite corners of the structure. All four hangars will be subject to surveillance in this way.

M020-022.indd 22 2012/11/29 上午12:24

Page 27: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F023.pdf 1 2012/11/29 上午2:28

Page 28: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F024-025.pdf 1 2012/11/29 上午2:29

Page 29: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F024-025.pdf 1 2012/11/29 上午2:29

Page 30: a&s International Dec. 2012 (Trial Version)

VIEWPOINT

26 DEC 201222 www.asmag.com 22

Why Structural changeS have IncreaSed demand

The main reason that the security industry has been able to prosper during the worst trading conditions for decades is that the structure of the business has morphed not just to compensate but to meet and beat the challenges.

Our 2012 Annual Report shows that both the middle strata and small companies have increased the size of the market and their share. The minnows are taking on the sharks and winning, both through the development of leading edge products and growth through acquisition and alliances. But the main driver is that they are delivering products and systems that are transforming the security industry from a cost center to a cash generator.

The business has also benefitted from IT, communica-tions and defense companies’ continued forays into the security industry, leveraging their expertise in digital technology and making serious inroads into homeland security and transport markets.

The second structural change is that the routes to the market have changed with system integrators now securing 50 percent of all product sales. Manufacturers are now partnering with system integrators to develop solutions that work across different vertical markets that add value, not just for improving security but to increase operating efficiencies as well.

IP Networking products can offer much more than analog when they are joined with other building services and the business enterprise. These additional benefits have definitely increased demand because they deliver a much improved ROI. There is no reason why the traditional distributor route cannot deliver the same service, but most distributors have not seen the need to change and prefer to shift analog boxes while their share of the market declines.

market groWth by Sector and regIon The total value of world production of products at

factory gate prices in 2012 was around US$20.6 billion. Of

The Security Industry Restructures to Meet New Challenges

SUBMITTED BY MEMOORI BUSINESS INTELLIGENCE

IMF projections for the rate of GDP growth across advanced countries in 2012 is 1.4 percent while the world market for physical security systems grew by 6 percent. Allowing for even higher rates of growth in emerging and developed economies, this is much more than a worthy perfor-mance, particularly for a mature industry. Video surveillance achieved 11.8 percent, double the rate of aggregate growth for the industry, while access control achieved 7.2 percent. Variation in performance across subsectors is even wider with IP Video Surveillance topping the performance charts at around 30 percent.

▲ Allan McHale, Director of Memoori Business Intelligence

M026-028.indd 26 2012/11/29 上午12:31

Page 31: a&s International Dec. 2012 (Trial Version)

27DEC 201222 www.asmag.com 22

this, video surveillance products at $10 billion increased their share to 49 percent, access control at $4.8 billion took a 23.5 percent share and intruder alarms at almost $5.8 billion had a 27.5 percent share.

The developed markets of North America and Europe are losing market share to Asia and particularly China, which will be the largest single market before the end of this decade. Asia has increased its share to over 35 percent for all physical security systems, while growth has been much more modest in North America and Western Europe, with an aggregate increase from 6 to 7 percent and 3.5 percent respectively over the last three years. This trend will continue well into the next decade.

The measure of penetration of physical security products in any country is an important factor because it sets a benchmark for the latent potential that is available to exploit. There is an enormous latent demand waiting to be exploited in the emerging markets of the world — these are the markets that manufacturers should be developing now because they will grow at much

higher rates than the developed markets of the Western world. China, for example, currently has a penetration of one-sixth of the U.S. but this stood at one-tenth in 2011, showing that the market is growing rapidly by taking up this latent potential.

The penetration of physical security products is highest in North America where GDP per capita is forecast at $49,340 and security sales per capita $14.81. In the E.U.(7), GDP per capita is projected at $42,240 and security sales per capita at $11.50.

In China the GDP per capita in 2012 is projected at $6,120, and sales per capita is $2.40 showing that the potential for future growth is enormous. This market has forged ahead at the highest rates of growth recorded in our industry and its aggregate growth over the last five years has not slowed down. However, despite the fact that its penetration has increased by almost 60 percent during this time, its penetration is still only a fraction of that in North America so there is much latent potential still to be exploited.

M026-028.indd 27 2012/11/29 上午12:31

Page 32: a&s International Dec. 2012 (Trial Version)

VIEWPOINT

28 DEC 201222 www.asmag.com 22

In the rest of Asia (including India) the penetration chart shows that this area now has a lower level of penetration than China. There are a number of countries in this group that have large populations such as India, Indonesia, the Philippines and Vietnam, and these countries have dragged down the penetration to $2 per capita. However Japan, Australia, South Korea and Singapore have much higher penetration of security on a parallel to western countries. Countries that have a long term potential to develop their latent potential include India, Thailand, Indonesia and the Philippines.

With such high penetrations in the western markets, growth has to come from the opening up of new vertical markets, the migration from analog to IP network systems and continual improvement in delivering a higher ROI.

market ForecaSt to 2017Our forecast for the next five years to 2017 is based on

world market trading conditions remaining fairly static; thereafter gradually growing through the following four years.

We forecast a CAGR of 5 percent over the 5-year-period.

This could be considered rather optimistic, considering that the European market will remain static at best. But since the end of 2007’s economic slowdown, the physical security market still managed to grow by a CAGR of 2 percent within the traumatic 5-year-period.

The security industry is now in a much healthier state with a product portfolio that can deliver more attractive opportunities for their clients to improve security. This together with the unstoppable growth of IP video network and access control, coupled with management identification and verification, will drive the market forward.

In addition, further growth opportunities are opening up in relatively new vertical markets and the smart building sector where system integrators from the security business are using PSIM and SAP platforms to deliver holistic systems incorporating monitoring building and energy performance in addition to security and safety. In the event that these drivers do not live up to their expectations, we can rely on the BRIC and other emerging markets to continue growing, and the move to cloud based systems.

For more details visit the website at http://memoori.com/physical-security-2012.

COMPARISON OF PHYSICAL SECURITY PENETRATIONBY MAJOR REGION 2006 & 2012

2012

North America

2006

14.11 Product Sales/Capita $USD47,000 GDP/Capita

E.U. (7)12.08 Product Sales/Capita $USD39,740 GDP/Capita

11.50 Product Sales/Capita $USD42,224 GDP/Capita

China1.53 Product Sales/Capita

4,170 GDP/Capita

2.40 Product Sales/Capita $USD6,120 GDP/Capita

Rest of Far East & S.E. Asia1.90 Product Sales/Capita $USD

9,000 GDP/Capita

14.81 Product Sales/Capita $USD49,340 GDP/Capita

2 Product Sales/Capita $USD9,800 GDP/Capita

M026-028.indd 28 2012/11/29 上午12:31

Page 33: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F029.pdf 1 2012/11/29 上午2:30

Page 34: a&s International Dec. 2012 (Trial Version)

30 DEC 201222 www.asmag.com 22

Network MaNageMeNt

Just a few years ago, an exchange between a CCTV project leader and the IT team would be deemed far-fetched. The reason was that CCTV systems

were overwhelmingly analog and in general a DVR was responsible for the recording, so discussions on bandwidth or other IT support was not necessary. That unbelievable exchange, cooperation between CCTV project leaders and IT teams, has now become a reality. Given that IT network teams can — and do — reprioritize bandwidth traffic and other services as demands dictate, adapting to this new reality is more important than ever. It is important to note that despite the fact that IT infrastructures are becoming less expensive (per unit) year after year, this expenditure should not be incurred lightly, especially with the cost of bandwidth over WAN and storage.

Today, more than ever, HD/IP-based CCTV projects must be incorporated into an enterprise's IT operational planning model, which includes demand/capacity planning, network operations, configuration and change management and so on. Like any high-technology-based system, IP CCTV systems need to have a fresh (but proven) approach to technology evaluation, systems design, product selection and implementation/instal-lation. More and more IP CCTV projects are being spearheaded with an enterprise’s IT organization.

Now, and for the foreseeable future, IP CCTV is predominately a green-field project. With that in mind, the proper selection of the right technology is critical to the successful implementation and ongoing operation of the CCTV system. Therefore, well before the technology is even evaluated, a justifiable and logical IP CCTV

strategy needs to be in place, and this strategy must be compatible with the IT infrastructure that must support it. Developing an IP CCTV strategy that includes functional and technical requirements as defined in part by the IT organization goes a long way when it comes to navigating between suitable technologies.

Of course there are many more possible consider-ations that can be included in the strategic framework for an IP camera system. The key take-away is to begin the design process with key IT infrastructure people on board. Then, describe and document the technical and

Video is critical and it is even more critical to get it right. Bandwidth optimization is not limited to mere tweaks to camera settings. Closer collaboration between IT department, system integrator and surveillance operator is more important than the old days of CCTV.

The Value of Network Assessment, Planning, Design and ExecutionSubmitted by Aronson security Group

Here are a few key factors to consider when developing an initial strategy:• Security risks — describe the security risks that the

system is intended to mitigate and also to substantiate the value of the IP CCTV system.

• Function — describe what the cameras are intended to achieve. For example, are the cameras intended to provide video verification of an access control system alarm? A key strategy is to match the function to a pre-established design standard already accepted by the enterprise.

• Technical — it is important to clarify the critical technical requirements of the system with a team that includes key IT personnel. This must be aligned with the cases, which are the key to the value proposition. Both must be in place in order for the deployment to be considered successful. For example, if you have a corporate VMS standard, then a key technical requirement is to ensure that the cameras are compatible with the VMS.

Some key factorS to conSider:

M030-032.indd 30 2012/11/30 上午12:53

Page 35: a&s International Dec. 2012 (Trial Version)

31DEC 201222 www.asmag.com 22

functional requirements to ensure the overall system is well thought out and acceptable before any serious technology evaluations are set in motion.

Technology evaluaTionOnce an IP CCTV strategy is agreed

upon, the next phase is technology evaluation. The goal here is quite simple; use the criteria defined in your strategy to begin the process of matching potential technologies that best suit your application. Many factors will come into play during the evaluation process, such as current standards, network limitations and constraints, video storage and archiving, cost, application considerations (for example, where will the cameras be used and under what environmental conditions), network security protocols, technical and functional integration and rules, and so on.

It is especially important to take an end-to-end, top-to-bottom view of the technology stack and the integration requirements when evaluating IP CCTV technology. A simple example; is there the possibility that a single camera will require two channel licenses instead of one due to the integration requirements from the VMS to the security platform? Knowing the answer to a question like this would certainly help to rein in the technology evaluation process and possibly even have one rethink their

strategy! Video compression and wide dynamic range (WDR) requirements are also significant to evaluating technology. Even the seemingly simple task of ensuring that camera lenses are compatible to the resolution you intend to achieve is an essential consider-ation. A certain degree of flexibility towards alternatives and other options is warranted.

▲ William Plante, Director of Professional Services, Aronson Security Group

M030-032.indd 31 2012/11/29 上午12:35

Page 36: a&s International Dec. 2012 (Trial Version)

32 DEC 201222 www.asmag.com 22

Network MaNageMeNt

Keep Technology on poinTThere are many technology solutions that endeavor

to address the same problems; bandwidth and storage being two key elements. While it is worthwhile to explore them, prudence is certainly justified before you make such a capital investment. For example, much is being said about the notion of video storage at the camera level and certainly some clever solutions have been derived from this idea (imagine RAID-like redundancy at the camera level). The best advice is to exercise critical judgment and solicit opinions from your technical team. Keep technology “on point” by adhering to the functional and technical requirements — for the most part, this is fail-safe.

Many of the same considerations that govern the IP strategy will also govern the system design. Storage and bandwidth utilization and cost considerations are typically the primary design drivers. Especially in large deployments that span across WANs, system designs that employ local storage and use view-on-demand or activity-based event management are becoming more frequent and necessary. Likewise, image characteristics such as frames per second, resolution and so on will also influence the system design. Once again an end-to-end, top-to-bottom system design process is indispensable. Finally, the system’s design may be deeply affected by the network team, who simply may not even permit such a large-scale bandwidth utilizing system to operate on the network. You may be required to design the system to be “out-of-band,” in other words, off of the production network. This calls for additional infrastructure and costs, which may become a critical factor for your strategy.

If the strategy as well as the technology evaluation and systems design process were meticulously thought out, then matching products to the system design is, hopefully, a straightforward matter. This is not necessarily “easy,” and you should follow the roadmap you have laid out. Obviously, some system components will be predetermined. Often times, the type of IT infrastructure used to support the CCTV system such as switches, patch panels, cabling and converters must be compliant to IT standards and purchasing agreements may dictate the manufacturer you are required to use. There are some understated considerations that are important to note. For instance, the manufacturer's product management program and service and support model should be as important a decision factor as the capability of the camera itself. No one wants to be stuck

in a technological cul-de-sac, nor do they want to be frustrated with a manufacturer's underperforming service plan. Personally, I tend to prefer technologies with some proven installations and similar design and intent to the project at hand even if that is not always possible. Again, design and engineering standards help consid-erably.

Lastly, HD/IP-based systems’ implementation and installation share some unique characteristics that also need to be accounted for. For instance, the qualifi-cation of the installing vendor, use of fiber optic cable, network gear and developing a network installation plan; these are some of the things that next generation systems integrator should be well versed in. Fiber optic cables and CAT6 cables have different bend tolerances compared to coax, hence the equipment layout needs to accommodate this. Especially important is the ability of the systems integrator to troubleshoot network conflicts collaboratively with the network team. For this reason, a plan that requires post installation network performance monitoring and fine tuning must be ready for execution in order for the implementation to be truly successful.

Various industry analysts expect that the adoption of digital video systems will continue to grow and will become the dominant technology in the not-too-distant future. Who drives a CCTV project, how that project will be managed, the kind of technologist that will design the system and the competencies of the installation company are among those elements certain to change. Implementing a structured engineered approach from the technology evaluation process through to project delivery is certainly a guarantor of a successful project.

▲ Storage, bandwidth utilization and cost considerations are typically the primary design drivers.

M030-032.indd 32 2012/11/29 上午12:35

Page 37: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F033.pdf 1 2012/11/29 上午1:48

Page 38: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F034-035.pdf 1 2012/11/29 上午1:55

Page 39: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F034-035.pdf 1 2012/11/29 上午1:55

Page 40: a&s International Dec. 2012 (Trial Version)

36 DEC 201222 www.asmag.com 22

Vertical Market

36 DEC 201222 www.asmag.com 22

M036-044.indd 36 2012/11/29 上午12:41

Page 41: a&s International Dec. 2012 (Trial Version)

37DEC 201222 www.asmag.com 2237DEC 201222 www.asmag.com 22

Serving as a gateway to the world, airports are the most important hubs for passenger and cargo travel between

cities, countries and continents. The rapid growth of urbanization means that, sooner or later, existing airports will have to be extended or new airports constructed so to satisfy the ever increasing demand for mobility. How to effectively manage and control security to ensure not only passenger and worker safety, but also national security has always been an issue of paramount importance.

Regional TRends North America will continue to lead in

invest-ments and remain

a substantial part of the global aviation security market. The Visiongain Report expects the emerging APAC market to become a significant aviation security market to watch. According to the report, the Middle East is another key regional market to look out for — owing to the robust growth path of its economy, which is stimulating domestic demand for civil aviation and encouraging greater levels of investments in aviation infrastructure.

aPaCThere have been significant developments

in airport infrastructures in the APAC region, with the opening of many new airports and expansion of others. According to a Frost & Sullivan report, the APAC airport security market accounts for 12 percent of the total homeland security spending for the region. The report projects that the airport security

Secured Airport

Terminals for

Safe Landings

Every day, airport operators are faced with the daunting respon-

sibility of ensuring process quality while guaranteeing the

security of passengers, personnel, goods and infrastructures at

the same time. The complex nature of the various subsystems,

processes and fulfilling official requlations require deep-seated

knowledge and dynamically flexible management of the entire

airport operations. a&s takes a look at how segments of terminals

are secured, along with their current challenges and future

trends.

By Tevin Wang

M036-044.indd 37 2012/11/29 上午12:41

Page 42: a&s International Dec. 2012 (Trial Version)

38 DEC 201222 www.asmag.com 22

Vertical Market

market will grow to US$9.23 billion in 2015. The three major segments of the market are: airport screening, surveil-lance and access control.

Some key markets for airport security growth are: Singapore, Thailand, Hong Kong, China, Malaysia, Indonesia and India. A i r p o r t d e v e l o p m e n t s a n d expansions have been aggressively carried out across the APAC region, especially in Thailand, China, Indonesia, Malaysia, Australia and the Philippines.

“China and India together have planned to develop and construct at least 93 new airports, in an effort to cater to the fast-growing air traffic demand in the two countries,” said Amartya De, Aerospace & Defense Consultant at Frost & Sullivan.

Hong Kong International Airport has a five-year development plan and a 20-year plan, which are renewed every five years. The facility’s Master Plan 2025 includes long-term expansion projects to accommodate increases in passenger and cargo volumes. The sum of security spending will be around $470.5 million.

Thailand has also firmed up its own airport-development plans, although only Phuket International Airport and Suvarnabhumi Airport in Bangkok have been identified as candidates for

development. The security spending is estimated to about $411.3 million.

Malaysia is trying to project itself as an aviation hub for low-cost carriers (LCC). A new, dedicated LCC terminal is currently under construction at Kuala Lumpur International Airport, and the security spending will be about $180.6 million.

Eyeing to become an air traffic hub in South-East Asia, Vietnam is also looking to develop at least three new international airports and expand seven of its existing terminals starting in 2011 through to 2020.

Japan and South Korea will be spending $9 billion to expand the capacity of three major airports. Incheon International Airport has

developed into one o f t h e b u s i e s t

airports in the region and the South Korean

government has plans to build an

airport city to establish i t s e l f a s a m a j o r international business center. Their airport security expenditure is projected to hit $518.4 million.

Airport security spending in Australia is expected to reach $640.2 million by 2015, and by which time the airport security spending in Singapore will have reached $298 million.

The Middle easTAviation has been earmarked as a

key growth area for the Gulf over the next decade. The wider Middle East is forecasted to see 400 million air travelers by 2020, according to IATA data.

Despite a worldwide slump, the aviation industry in the Middle East region continues to gain momentum as Gulf states move to position themselves as global travel hubs, according to Khaled Almazroui, GM of Fujairah International Airport.

“Gulf nations are set to spend $90 billion on airport development by 2020, almost a third of which will be funneled into security. Of the total $90 billion, about 30 percent will be spent on security equipment and training.” Almazroui said. “To name a few developments, Dubai has allocated $10 billion, Abu Dhabi $6.8 billion, Qatar $11 billion, Jeddah $1.5 billion, Muscat $1.2 billion and Kuwait approximately $2.1 billion.”

Rick Ramsay, Senior Product

Manager, Avigilon

Anthony Incorvati, Business

Development Manager, Transportation,

North America, Axis Communications

▲ APAC and the Middle East are becoming significant aviation security markets to watch.

M036-044.indd 38 2012/11/30 上午1:10

Page 43: a&s International Dec. 2012 (Trial Version)

39DEC 201222 www.asmag.com 22

assess, Plan and design A i r p o r t s a re f a c i n g s e v e r a l

cha l l e ng es : t h e e f f i c i e n t a nd cost-effective management of the increasing numbers of passengers, freights, and baggage; the creation of environmentally friendly solutions and products; plus compliance of rising, multifaceted worldwide security standards. Another obstacle of airport planning is the balancing of conflicting requirements: maximum security and travel experience. “When considering the design approach, as well as the benefits, for check-in counters, airport customs, duty-free shops, entrances, gates, and baggage claim, my way of thinking is straightforward: risk, threat and vulnerability analysis has to be applied,” said William Plante,

Director of Professional Services, Aronson Security Group. “Airports require a common operating picture for an effective and disciplined response. They must identify, organize and communicate data to create that picture. And they must tie their regulatory standards to their operational execution.”

Preventive measures such as video surveillance, intruder alarms, access control, biometric identification and X-ray systems are key components to forming the basis of aviation security systems. In addition, fire safety and extinguishing and evacuation systems are also a must.

Network infrastructure and sufficient bandwidth play important roles in airport planning. According to Siemens, maintaining smooth

and reliable operations of terminal buildings and equipment is critical to an airport’s viability. Should an incident occur, rapid intervention is a must. Threats have to be identified early and eliminated in a reliable and consistent manner — affecting as few passengers as possible. With that said, it is best to prevent incidents to avoid their occurrence in the first place. Whether it is a suspicious bag, a column of smoke, or unauthorized access — all the various processes must work together to ensure an appropriate level of response.

Plante agreed. “Since there are multiple owners and ‘customers’ responsible for airport security, I think the process optimization should be based upon the risk assessment for each distinct area, and that COP

M036-044.indd 39 2012/11/29 上午12:41

Page 44: a&s International Dec. 2012 (Trial Version)

40 DEC 201222 www.asmag.com 22

Vertical Market

(Common Operating Picture from a Security Information Management approach) with edge intelligence should be applied.”

TeRMinal ZonesSecurity screening begins as soon as

passengers arrive inside the terminal, according to Siemens. A fingerprint or 3-D face-recognition scanner records and compares your biometric data, which can also be used to increase security and speed processing at the gate.

CheCk-in CounTeRs“Security cameras and CCTV

systems are essential to monitoring and scrutinizing suspicious activities, left baggage, abandoned vehicles and other potentially harmful situations,” said Rick Ramsay, Senior Product Manager, Avigilon.

Large groups of travelers also indicate traffic bottlenecks. Check-in bottlenecks usually lead to poor passenger experience, increased complexity and potential disrup-tions. Overcrowded check-in counters also increase mishandled baggage tendency. According to SITA baggage report, mishandled baggage cost the

industry some $3.7 billion per year and this does not include delayed flight costs due to baggage problems, gate parking costs for baggage delayed flights.

Intelligent video systems can also be used to detect bottlenecks at check-in. This means airport procedures can be optimized and long waiting periods avoided, according to Siemens. Solutions should be designed to achieve one purpose: to improve the mobility and security of passengers and personnel and at the same time optimize efficiency.

To avoid passenger fraud at check-in counters, HD quality video should be used. HD makes facial details as well as the information on boarding passes, IDs and passports readily available for cross-referencing, according to Anthony Incorvati, Business Development Manager, Transportation, North America, Axis Communications.

Speedier processing at check-in counters t rans la tes to h igher passenger satisfaction rates, lowered costs, increased revenues and even an increased level of security to give airport operators a competitive edge in this highly dynamic environment.

aiRPoRT CusToMsAirport customs require high

security with detailed monitoring to ensure people that pose a threat are not bypassing protocols or entering secured areas. “In addition, customs officials who do not follow proper procedures can be problematic,” said Ramsay. “Airport security is threatened when these systems are not properly in place.”

Applications such as line crossings, wrong-way or loitering detection are mostly deployed for strategic locations such as customs gates and aircraft ramps. VCA is often used from site to site, depending on project requirements. Simple VCA such as motion and object detection can help to spot people who have crossed checkpoints from the non-security side to the secured side, and will issue alarms to notify relevant personnel. In addition, it can also provide evidence to assist with tracking and identifying the intruder.

duTy-FRee shoPsDuty-free and other retail shops

share and retain the same threats that traditional retail environment face. “Whether shops are located in airports or malls, the potential for theft, false liability and faulty purchases or returns remains,” said Ramsay. “Duty-free shops can benefit from POS integration, to have the capability to spot suspicious activities before they occur and utilize quick-search features to facilitate investiga-tions.”

Typically, these shops are treated as a tenant-based service by the airports. “Airports sell them bandwidth for use in their stores, and then it is up to the stores to purchase their own systems,” said Incorvati. “On top of 'gaining’ all the typical security ▲ Check-in bottlenecks usually lead to poor passenger experience, increased complexity and potential disruptions.

M036-044.indd 40 2012/11/29 上午12:41

Page 45: a&s International Dec. 2012 (Trial Version)

F041.indd 1 2012/11/29 上午1:45

Page 46: a&s International Dec. 2012 (Trial Version)

42 DEC 201222 www.asmag.com 22

Vertical Market

threats that airports experience, the shops must also worry about Loss Prevention initiatives. As in the retail world, these shops are also leveraging analytics and software with their surveillance systems for marketing and operational purposes.”

Airports generate revenue through retail operations. Long lines take away the time that travelers have to shop and spend in the commercial areas of the airport. Crowd detection video analysis helps by alerting airport officials whenever crowds or queues exceed certain thresholds. Airport control room operators see the alerts on a map that links to real-time or recorded video. This enables them to immediately know when and where there is overcrowding in order to fix it.

enTRanCe gaTesArriving and departing passengers

must not mingle, especially before the arriving passengers are screened. Entrances to gates need to be accessible to the public in case of emergencies. “Potential threats arise when these areas are understaffed or blocked from access,” said Ramsay. “Alarms that are linked to pop-up videos to display potentially dangerous situations are essential for ensuring safe gate entrances. Immediate review of such video is the key to ensuring forced doors alarms are inspected. Airlines will benefit from adequate staffing, staff attendance and quick resolution of customer disputes.”

Baggage handling and ClaiM

Baggage handling is restricted to staff who have authorization to work in close proximity to aircrafts, and this requires access control and screening

procedures. Iris recognition can be deployed to manage employees crossing from the landside to airside.

Since Sept. 11, the baggage area is fully automated and requires high-level security access rights. Hundreds of HD and vandal-resistant cameras are deployed throughout the conveyor belt systems to monitor checked-in baggage. These vandal-resistant cameras are embedded with image tampering analytics that will trigger an alarm when security events occur.

Potential security threats in baggage claim areas include baggage theft by airport employees or passengers, passengers collecting incorrect baggage, theft committed by external thieves and people attempting to access secure areas of the airport without permission.

HD quality video is helpful for seeing the facial details of thieves as well as offer detailed images of threats. Intelligent surveillance solutions encompass the collection of information from various sensor systems such as video cameras, radars and GPS to facilitate the assessment and evaluation of the activities in a specific area. Video analytics ensures

that conspicuous or suspicious passenger behavior, abandoned luggage in corridors, lounges or at the gates, check-in and duty free areas can be immediately identified. And it allows necessary measures against drug smuggling, theft and terrorists attacks to be taken at the earliest opportunity possible. According to Siemens, whenever people or vehicles pass through defined security zones, live, real-time video is automati-cally displayed on a single screen for security personnel’s verification. The signals can be evaluated quickly and securely, and necessary measures can be automatically or manually executed. This represents a consid-erable cost reduction for airport operators and increased the security for the airport as a whole.

all aBouT The deTails“In airport security, it is important

to be able to zoom in and determine distinguishable details,” said Ramsay. “This will flag potentially hazardous situations and enable security professionals to review pre- and post-incident footage for fast response whether at check-in counters, duty-free shops, gate entrances or

▲ HD and vandal-resistant cameras are deployed throughout the conveyor belt systems to monitor checked-in baggage.

M036-044.indd 42 2012/11/29 上午12:42

Page 47: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F043.pdf 1 2012/11/29 上午1:56

Page 48: a&s International Dec. 2012 (Trial Version)

44 DEC 201222 www.asmag.com 22

Vertical Market

baggage claim areas. “All of these areas pose unique challenges, which can be overcome by a strategic and intelligently designed HD surveil-lance system. The key to designing the most effective surveillance system in any situation is to determining what ’evidence’ needs to be captured and developing a security solution based on these needs.”

“The best way to determine which camera is most appropriate for each scenario is by using the pixels-per-foot concept,” advised Ramsay. “To do this, we measure the number of pixels being captured by the image sensor and divide it by the horizontal width of the scene covered. By carefully defining what we want to capture and determining the placement of the camera from the target, we can set expectations of the exact detail we will gather. In general, we focus on using higher megapixel cameras to cover larger areas and strategically position these cameras to where they are most beneficial. This allows us to reduce the number of cameras necessary and effectively capture useful footage.”

inTegRaTion and ManageMenT

In airports, it is crucial to implement systems that are created with an open platform and have the ability to work collaboratively. A complete system that unites different aspects of security, such as HD hardware and software, access control, and external alarms, will provide the best surveil-lance possible.

Airports have many islands of information, essentially security systems that are silos, according to Moti Shabtai, VP Security, Nice Systems. “The first benefit of PSIM (Physical Security Information Management) is its ability to tie these

sub-systems together in a cohesive common operating picture. PSIM integrates, synthesizes, and analyzes information and alerts from different security and safety systems.”

“The second benefit relates to visualization. Once the dots are connected between these complex sets of information and incidents are revealed, they’re overlaid on a map-based interface — making it easy to get a real-time visual represen-tation of an event and the associated assets and people involved. Everyone involved in the incident share a common understanding of what is going on,” said Shabtai. “Finally, PSIM ensures consistent responses, in keeping with the airport’s pre-defined standard operating procedures. The airport employs a variety of security and life safety systems, including video surveillance, access control, fire alarms, CAD, Voice over IP (VoIP) and automated external defibrillator (AED) alarms. Through the use of PSIM, airports are able to integrate all of these systems into a common operating picture (COP), which allows dispatchers to have access to all of the real-time information they need, in a relevant context, on PSIM screens. PSIM will put forward appropriate response(s) based on

all of the different indicators; such an adaptive, pre-defined response plan ensures standard operating procedures are followed.”

FuTuReAccording to a Frost & Sullivan

report, security spending at airports around the world is expected to increase to over $45 billion by 2018. "High threat perceptions of criminal or terrorists attacks will continue to boost investment in airport security," according to the report. "Regional and global legislations are constantly amended and updated in an attempt to address up-to-date criminal or terrorist activities. This has compelled airport operators worldwide to continually update to the latest security procedures and technological solutions."

The integration of security systems is becoming vital for airport security managers. Through integration, security control will become more comprehensive and can respond to identified threats in a more efficient and effective manner. Therefore, technology that can be easi ly integrated will be in the most compet-itive position in the procurement process.

▲ Through integration, security control can respond to identified threats in a more efficient and effective manner.

M036-044.indd 44 2012/11/29 上午12:42

Page 49: a&s International Dec. 2012 (Trial Version)

F045.indd 1 2012/11/29 上午1:47

Page 50: a&s International Dec. 2012 (Trial Version)

Special Feature

46 DEC 201222 www.asmag.com 22

Special Feature

Upheavals in Security

46 DEC 201222 www.asmag.com 22

THE GLOBAL ENVIRONMENTThe global recession in 2008 shook

the security industry and shattered the myth that the industry is immune to the ups and downs of the economic environment. The security industry has traditionally been driven by government budgets, and the slashing of government budgets in the U.S. and the E.U. in the aftermath of the recession deeply affected the security industry, as it froze or postponed security projects. With the already matured economies at a standstill, all eyes are on the emerging economics such as the BRICs, the Middle East and Asia.

2013:

BY John shi

With 2012 behind us, the focus is now on the year ahead. A 2013 preview undoubtedly requires a review of 2012. In this section, a&s sums up the storms of the security industry in 2012 and peeks into the prospects of clear skies in the upcoming year.

M046-050.indd 46 2012/11/29 上午12:44

Page 51: a&s International Dec. 2012 (Trial Version)

47DEC 201222 www.asmag.com 22

TIGHT BUDGETS SQUEEZE SECURITY

Tighter budgets correlated with price sensitivity and in turn, price compar i sons . The t ighten ing o f b u d g e t s a l s o c o i n c i d e d with the inf lux of low-priced Chinese products in the market. Consequently, price turned into a powerful force shaping end-user purchasing behavior and this spread through all market segments rapidly.

Cost-effective solutions from major

brands crush the security industry from the top, while low-priced Chinese products do so from the bottom. Together, the two forces affect the entire security industry on all levels, from manufacturers to distributors, system integrators and installers. With no escape from the intensive competition and profit-squeeze, all industry players must face the question of how to survive.

INDUSTRY RESTRUCTURINGIn this current market environment,

manufacturers are confronted with intense competition, which causes prices to fall and in turn, batters the distribution channels with declining revenues. No industry player is spared from the challenge of how to increase revenues while sustaining profits, and in the survival of the fittest game, companies must adapt to the changing environment. For example, Norbain, a leading security company in the U.K., announced mid-year that they were restruc-turing. The network that they have established throughout the years fell apart, and their overseas branches became independent entities. A similar scenario is seen in the U.S. —Rainbow CCTV and GVI hung up their white flags.

The traditional giants are toppling over in the battlefield, but new giants are rising up at the same time. For example, IT giant Ingram Micro entered the security market in 2009; other IT industry players are also following suit and taking giant strides into the IP security world. In the market today, grim financial circumstances and techno-logical evolution are submerging the companies that are unable to move along with the tides, but at the same

47DEC 201222 www.asmag.com 22

M046-050.indd 47 2012/11/29 上午12:44

Page 52: a&s International Dec. 2012 (Trial Version)

Special Feature

48 DEC 201222 www.asmag.com 22

time new competitive companies are emerging with confidence. As the saying goes, heroes are created in times of war.

In Southeast Asia, value-added is the buzzword. Sales representa-tives find that they are required to strengthen their technical support and customer services. For distrib-utors, most are focusing on complete systems to offer comprehensive solutions. They are also shifting towards providing complete product lines to offer end users integration and interoperability.

Roles within the industry are also changing. For example, some video surveillance sales representatives are adding access control systems to their products lines in order to increase revenues and profits. At the same time, veteran system integrators are throwing in the towel and becoming distributors of major brands, hoping to cash in on the IP trend.

CHINAThe impact of China as a manufac-

turing powerhouse is not to be dismissed. To illustrate its impact, a Moscow sales representative’s experience provides a good example. The company concentrated on Korean and Taiwanese products last year, but had to greatly increase the quantity of Chinese products they carry this year. This is because their competitors have begun selling Chinese products, creating a double-edged sword for them. If they do not follow suit, their sales revenue would be severely affected, but going along with the others provides f e w r e w a r d s . T h e c o m p a n y complained that

Chinese products have a low profit margin and fast-changing product specifications. These products need to be sold as soon as possible or face the fate of clearance sales. Hence, with time, industry players will be squeezed out of the market because it is unprofitable.

THE IP REVOLUTIONIn the not too distant future, IP

will extend its lead over analog in the market. According to IMS Research (an IHS company), Axis Communications, a company that specializes solely in IP cameras, has risen to become the No.1 vendor in the g lobal camera market . The reigning posit ion of Axis demonstrated the rapid pace of the changing tides in the security industry.

IP technology is maturing quickly and intensi fying compet i t ion amongst vendors. At 2011 Secutech Taipei, IP cameras from both large and small manufacturers were compared and tested. At that time, IP camera specifications between the manufacturers varied greatly. Results of conformance to the ONVIF specifi-cation were equally disappointing. Fast forward to April 2012 and the

second IP camera testing event, the manufacturers were able to showcase cameras that were consistent in specifications. Also, it was discovered that there was a similarity of up to 80 percent between the cameras in image quality and conformance to ONVIF. This maturation has occurred within the time span of a year and should serve as a strong signal for the video surveillance industry — it is telling the industry that IP cameras will now be differ-entiated by brands, marketing and customer service, and in 2013, price as well.

CLOUD COMPUTINGThe maturation of IP applica-

tions coupled with the maturation of cloud computing is propelling the concept of security as a service.

Tighter budgets correlated with price sensitivity and in turn, price comparisms. Price turned into a powerful force shaping end-user purchasing behavior.

M046-050.indd 48 2012/11/29 上午12:45

Page 53: a&s International Dec. 2012 (Trial Version)

F049.indd 1 2012/11/29 上午2:09

Page 54: a&s International Dec. 2012 (Trial Version)

Special Feature

50 DEC 201222 www.asmag.com 22

Both providers and end users can expect to benefit from this combination. First, end users no longer have to invest large amounts in infrastructure and maintenance because they can now subscribe monthly to more rel iable and consistent services. Second, service providers can now enjoy more stable revenues with monthly subscription fees.

HOME SECURITY HAS HIGH POTENTIAL

The high penetration of smart d e v i c e s i n t h e s o c i e t y t o d a y allows everyone to have a remote monitoring device on hand. As humans are visual beings, the maturation of this technology has potential for fast growth. Home owners can keep a watchful eye on their homes, and business owners can maintain a grasp on their operations.

Demand for home security is also changing the industry. Buyers from this industry would be telecos and security service providers. In the future, IP cameras are also likely to be distributed through the warehouse store channels to cater to the general market. Four channel DVRs and NVRs will likely be replaced by this trend, thus transforming end-user applications in the market.

SMART ACCESS CONTROLWi t h t h e s e c u r i t y i n d u s t r y

migrating to IP, access control is riding along with the waves. Wireless electronic locks and NFC stand out as noteworthy trends in this segment. Firstly, the wireless feature enables easy and fast installation. Secondly, it provides flexibility in access grants, while ensuring security for end users

that require constant changes in access provisions. Thirdly, this new technology is convenient because access control can be managed and updated remotely via software in accordance to requirements.

Mobile access control is made possible with the high market penetration of smartphones. NFC enabled smartphones can now receive access control credentials over-the-air in this innovative application. When innovative technologies are introduced into security, industry players stand out when they can provide end users with creative applications that are more convenient, efficient and secure.

BIOMETRICSBiometrics is another segment

witnessing new, exciting applica-tions. An access control company based in Hong Kong, for example, found a way to address safety issues in the event of explosion accidents at mining sites in China. During such an event, it is imperative that the local government and insurance companies have a grasp of how many people are hurt, missing or trapped underground, but this has been difficult in the past. Biometric access control systems, however, al lows management to have a

grasp of the number and identities of employees working on-site and underground at all times.

HD-SDI EXPECTS TO SEE GROWTH

In 2013 , HD-SDI can expect advancements in transmission and storage technology. More competitive prices can also be expected with the technological breakthroughs. This will make HD-SDI more attractive to end users and encourage rapid adoption of this technology in various market segments.

COUNTDOWN TO CLEAR SKIES

Despite the general economic uncertainty, excess supply versus demand and the influx of Chinese products, the 2013 market remains worth anticipating for. However, in the current economic climate, restruc-turing is inevitable if the industry is to move forward.

At the same time, value-added is a significant trend in the security industry, and companies are racing to add value to their products in the search for higher profits. The past year has been rough for some but resilience will pay off; spring will come when the new market order falls into place.

▲ Restructuring is inevitable if the industry is to move forward.

M046-050.indd 50 2012/11/29 上午12:45

Page 55: a&s International Dec. 2012 (Trial Version)

F051.indd 1 2012/11/29 上午1:59

Page 56: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F053.pdf 1 2012/11/29 上午2:10

Page 57: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F055.pdf 1 2012/11/29 上午1:58

Page 58: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F057.pdf 1 2012/11/30 上午1:22

Page 59: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F061.pdf 1 2012/11/29 上午2:11

Page 60: a&s International Dec. 2012 (Trial Version)

F063.indd 1 2012/11/29 上午1:57

Page 61: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F065-馥鴻.pdf 1 2012/11/30 上午1:39

Page 62: a&s International Dec. 2012 (Trial Version)

F067.indd 1 2012/11/29 上午1:40

Page 63: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F069.pdf 1 2012/11/29 上午1:40

Page 64: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F075.pdf 1 2012/11/29 上午1:42

Page 65: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F079.pdf 1 2012/11/29 上午1:43

Page 66: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F083.pdf 1 2012/11/29 上午1:31

Page 67: a&s International Dec. 2012 (Trial Version)

F091-zk.indd 1 2012/11/29 上午1:30

Page 68: a&s International Dec. 2012 (Trial Version)

93AUG 201122 www.asmag.com 22

F093.indd 93 2012/11/29 上午1:36

Page 69: a&s International Dec. 2012 (Trial Version)

Storage AcAdemy

95DEC 201222 www.asmag.com 22

According to estimates from Seagate, it would take over 18 million TB of storage to support currently deployed surveillance cameras for

a 14-day recording period. The number of hard drives required for this storage capacity would stretch across China twice if laid end to end!

These statistics underscore the staggering growth of surveillance and storage technologies over the past 15 years. Increased capacities, improved performance and lowered costs in storage technology are driving growth in global camera shipments. Research firm In-Stat forecasts over 51 million camera shipments by 2014. Furthermore, IMS Research expects more than 70 percent of network cameras will be megapixel resolution by 2015, requiring at least four times the amount of storage than analog

cameras used today. F o r t h e s t o r a g e industry, more cameras plus higher resolutions equal increased storage needs.

To m e e t g ro w i n g storage demands, drive manufacturers must maintain data integrity while improving areal density. Breakthroughs in t rack dens i ty — how closely tracks of data are arranged on a drive — are becoming

particularly important stepping stones toward increased capacities.

For example, Seagate® SV35 Series™ hard drives now have up to 3TB of capacity — enabling up to 42 days of high-quality video recording (1,280x1,024 frame resolution, 30 fps, H.264 compressed video) and making them ideal for SDVR configurations with multiple camera inputs. SV35 Series drives boast 340,000 tracks per inch, making each track only 75 nanometers wide — smaller than a single flu virus.

Seagate also leveraged this technology on their Pipeline HD® video-optimized drives and Constellation® ES enterprise drives to help surveillance systems meet capacity needs. Pipeline HD drives support low camera counts and power requirements and can be found in capacities up to 2TB. Surveillance users who demand high camera counts and centralized storage may benefit from Constellation ES drives. With capacities up to 4TB, these enterprise-class drives ensure performance and reliability for centralized storage.

The surveillance industry continues to grow at astounding rates, as do its storage demands. As hard drive manufacturers develop technol-ogies to maximize data capacity, surveil-lance systems will continue to provide security around the world. Undoubtedly, storage will remain a critical element of these surveillance solutions.

A Central Part of Today’s Surveillance Landscape

Submitted by Seagate

For more information, please visit http://www.seagate.com/internal-hard-drives/consumer-electronics/sv35/?cmpid=ctc-_-AS-Oct12.

As storage capacity demand increases over 50 percent every year, the need for fast, high-capacity and reliable storage solutions is clear.

But can the hard drive industry keep up with burgeoning storage demands, particularly from the surveillance market?

1 “Changing Digital Storage Requirements for Clouds and Mobile Devices.” Tom Coughlin, Forbes.com, June 17, 2011.2 In-Depth Analysis Video Surveillance: Analog and IP Cameras, DVRs, NVRs, Analytics, Semiconductor and Technology, In-Stat, January 2011.3 “The World Market for CCTV and Video Surveillance Equipment—2011 Edition.” IMS Research, 2011.4 “The Advantages of Megapixel.” Supercircuits, Inc., 2012.5 “Purpose-Built Hard Drives for Digital Video Surveillance.” Seagate Technology LLC, 2012.

Storage Capacity:

M095.indd 95 2012/11/29 上午1:06

Page 70: a&s International Dec. 2012 (Trial Version)

24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan 24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan

From Components, Products to Applications, Discover Every Aspect of HD Surveillance

Is it right for me? IP Megapixel or HD SDI?

What is HD SDI?How to choose the right solution?

Is there any hidden agenda/cost?

Can it meet my budget plan?

How to upgrade current system with HD SDI products?

How to integrate IP and HD SDI?

World’s grand showcase of HD surveillance!• 500+ HD manufacturers• 2000+ kinds of HD new launches• In-depth technology and application talks• Latest and diversified solutions

Technology

Seminar:

Cloud Computing

Product Contest:

2013 IP Camera/ NVR Excellence Award

Special Section:

VSaaS & Home Security Gallery

Forum:

The Integration of IP Surveillance, Access Control, and Others

Seminar:

Over 100-meter transmission

Product Demo:

HD SDI Camera/ DVR Live Demo

Forum:

Real-life Case Stories of HD SDI Surveillance

Product Contest:

2013 960H Camera/DVR Excellence Award

Seminar:

Value-added Designs

Special Section:

Vehicle Security Gallery

Forum:

Management Software Forum for VMS and IVS

Product

Application 20122013

IP Megapixel HD SDI More Options960H

HD Surveillance

Contact us: [email protected]; +886-2-2659 9080 Ext. 358 Like us Search us Email us Phone us Register now at www.secutech.com or Secutech APP!

M096-099.indd 96 2012/12/1 上午12:43

Page 71: a&s International Dec. 2012 (Trial Version)

24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan 24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan

From Components, Products to Applications, Discover Every Aspect of HD Surveillance

More Options

SJ MICROTECH-SJD210B83NDTSJ M icrotech’s presents the new HD -SDI camera, SJD210B83NDT, featuring high quality 1,100 TV lines progressive scan. Empowered by 1/3” 2.2 megapixel CMOS sensor, SJD210B83NDT provides full HD quality @1080p and 720p. Auto WDR and DSS (Digital Slow Shutter) function allow the camera to achieve great result in low light. The advanced 3D DNR technology make sure good quality in a lower lighting level, with minimum illumination of color 1.0Lus (DSS off). SJD210B83NDT comes with various WB mode (auto, one pushing and manual), resolving color problems and ensure whites comes out white. Various digital features — including motion detection, mirror, flip, D-zoom, privacy masking, shading and others — meet monitoring requirements. Equipped with 2.8~12mm TDN DC auto iris lens, SJD210B83NDT is also weatherproof (IP-66).

Booth No. : [email protected]

Ronix-RWS-AFZ39SP-IRRonix, the frontier company in video

technology, is a member of HD CC T V

ALLIANCE. The company introduced its latest

HD-SDI camera, RWS-AFZ39SP-IR, providing

advanced megapixel resolution with auto

focus zoom capability. The camera achieves

high quality picture and its advanced color

reproducibility deserves attention. Standing

out from others, the new HD-SDI camera

equipped with patented FOCUS setting Aid,

Day & Night simulation, supporting NEEDLE

FOCUS, and makes sure error free focus

adjustment. Moreover, Ronix’s developed its

own Optic Transmission Repeater, allowing

transmission distance of 10km.

Booth No. : [email protected]

Awareness of HD-SDI has been growing since its inception in 2009. Market penetration, however, has been less than stellar, due to component/system availability, pricing structure and deliverability issues. Luckily, a number of dedicated chipset and solution providers have been working tirelessly to offer more affordable packages that address compatibility, transmission, storage and display challenges. One of the vertical segments that would particularly benefit from this technology is financial/banking, which has extensive proprietary analog infrastructure and above-average HD requirements. As such, Secutech will host the world’s largest HD-SDI pavilion in April 24-26 2013, featuring the industry’s first live demo of HD-SDI solutions in a simulated bank environment. Take a sneak peek at what’s on offer at this exciting event now!

Zoom in on HD-SDIat Secutech !

Register now at www.secutech.com or Secutech APP!

M096-099.indd 97 2012/12/1 上午12:43

Page 72: a&s International Dec. 2012 (Trial Version)

24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan 24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan

Zoom in on HD-SDIat Secutech !

AVICO AVIR-HDX3VAHDAvico's new HD-SDI camera, AVIR-HDX3VAHD, features full HD resolution with 3-times optical zoom lens, day and night (ICR) function. AVIR-HDX3VAHD also features wide dynamic range and digital noise reduction (2D+3D) technology, making sure quality image in changing light condition. Moreover, digital Slow Shutter(DSS), and High Light Compensation(HLC) function help camera to work under intense light and reverse bright spots in the picture. Privacy mask and defog function prevent sabotage and enable the clear vision. On screen display and intelligent motion detection help increase user experience. VISCA, Pelco-D, Pelco-P protocols are also available to suit installation needs.

Booth No. : [email protected]

HDPRO HD-MP138VTLHDPRO launched a new series of HD-SDI Megapixel

Dome and true Day & Night Weather-Proof IR Camera.

We are proud to bring you our latest HD-SDI cameras,

featured here.This model integrates 1/3-inch Panasonic

Progressive Scan color sensors which offer 1080P HD-

quality pictures at 30frames per second, as well as dual

output. Users will see vivid HD-quality images and

receive great performance.

Our cameras also boast defogging functions, no noise

thanks to their DNR features and high resolutions

with their 64 times digital zoom. The new model HD-

MP138VTL incorporates 2.8 to 10mm DC AI VF. True

day and night with ICR and 28pcs IR LEDs allows

camera deliver uncompromised image at night. Full

OSD operation improves user friendliness as well. We

are confident your customers will be satisfied with our

products’ powerful performance and unique designs.

Booth No. : [email protected]

Register now at www.secutech.com or Secutech APP!

M096-099.indd 98 2012/12/1 上午12:43

Page 73: a&s International Dec. 2012 (Trial Version)

24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan 24-26 April, 2013Taipei Nangang Exhibition Center, Taiwan

Sicam SCL-H159L cameraSicam launched a series of HD-SDI Cameras with Panasonic 2.1 Mega

CMOS and Eynix DSP, with a full line-up of HD-SDI cameras including

IR bullet, IR dome, Miniature, Box camera and many others. Sicam’s

HD-SDI Camera consists of High-End and Cost-Effective features to

suit customers’ needs and budget. Manufacturing process and R&D are

undertaken in house.

Sicam's SCL-H159L is special designed by stability and enhanced Day & Night function.

Above all, IR Distance is available for Max. 100M and it is very easy installation due to using junction box.

For customer needs, The many kinds of lens is avilable for using from f=2.8~11mm to f=5~50mm and it has a

various option such as Heter and Fan built-in.

Booth No. : [email protected]

MICRODIGITAL MDC-H6290VTD-32UMDC-H6290VTD-32U is 2.1 Mega Pixel UTC (Up The Coax) HD-SDI Camera. The difference compared to normal HD-SDI Camera is that a user can control focus, focal length and OSD through a single coax cable by a remote controller for the ease of setup whenever it’s needed.MDC-H6290VTD-32U provides a crystal clear picture quality with powerful features such as True Day & Night, Dual Video Output (HD-SDI & CVBS) , WDR, BLC and ACE as well. Microdigital has launched various types of UTC HD-SDI Camera already.

Booth No. : [email protected]

M096-099.indd 99 2012/12/1 上午12:43

Page 74: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F101-威聯通.pdf 1 2012/12/1 上午12:28

Page 75: a&s International Dec. 2012 (Trial Version)

102 DEC 201222 www.asmag.com 22

SHOW CALENDAR

WORLD SECURITY EXHIBITION DIRECTORY

• Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. • Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

IFSEC IndiaDate: 2012/11/1-11/3Venue: India Expo Centre, Greater Noida,

IndiaTel: +91-11-2376-5553Email: [email protected]: www.ifsecindia.com

Sicurezza 2012Date: 2012/11/7-11/9Venue: Fiera Milano (Rho), Milan, ItalyTel: +39-02-4997-6255Fax: +39-02-4997-6252Email: [email protected]: www.sicurezza.it/en

Security Asia-International Exhibition 2012Date: 2012/11/7-11/9Venue: Singapore Expo, Hall 2, SingaporeTel: +65-6285-3088Email: [email protected]: www.saeshow.com

MEFSEC 2012Date: 2012/12/1-12/4Venue: Cairo International Convention

Center, Cairo, EgyptTel: +202-2735-5837Fax: +202-2735-8801Email: [email protected]: http://www.mefsec-middleeast.com

Security China 2012Date: 2012/12/3-12/6 Venue: China International Exhibition Center

(New Center), Beijing, ChinaTel: +86-10-5192-0615Fax: +86-10-5192-0049Email: [email protected]: www.securitychina.com.cn

ExpoprotectionDate: 2012/12/4-12/7Venue: Paris Porte de Versailles, Paris, FranceTel: +33-4756-5045Email: [email protected]

URL: www.expoprotection.com

IFSEC & OSH Arabia 2012Date: 2012/12/9-12/11Venue: Riyadh International Conference and

Exhibition Centre (RICEC), Riyadh, Saudi Arabia

Tel: +44-20-7921-8069Email: [email protected]: www.ifsecarabia.com

Intersec 2013Date: 2013/1/15-1/17Venue: Dubai International Convention and

Exhibition Centre, Dubai, UAETel: +971-4-389-4500Fax: +971-4-358-5511Email: [email protected]: www.intersecexpo.com

Security and Safety Technologies 2013

Date: 2013/2/12-2/15Venue: Crocus Expo, Moscow, RussiaTel: +7-647-0402Fax: +7-221-0862Email: [email protected]: www.eng.tbforum.ru

Safe Secure PakistanDate: 2013/2/26-2/28Venue: Karachi Expo Centre, Islamabad,

PakistanTel: +92-21-111-734-266Fax: +92-21-324-10723Email: [email protected]: www.safesecurepakistan.com

Secutech India Date: 2013/2/28-3/2Venue: MMRDA Grounds, Bandra Kurla

Complex, Mumbai, IndiaTel: +886-2-2659-9080 ext. 770Fax: +886-2-2659-9069Email: [email protected]: www.secutechindia.co.in

Security Show 2013Date: 2013/3/5-3/8Venue: Tokyo Big Sight, Tokyo, JapanTel: +81-3-3512-5670Fax: +81-3-3512-5680Email: [email protected]: www.shopbiz.jp/en/ss

ISC West 2013Date: 2013/4/10-4/12Venue: Sands Convention Center, Las Vegas,

NV, U.S.Tel: +1-203-840-5602Fax: +1-203-840-9965Email: [email protected]: www.iscwest.com

Secutech International 2013Date: 2013/4/24-4/26Venue: Taipei World Trade Center Nangang

Exhibition Hall, Taipei, TaiwanTel: +886-2-2659-9080 ext. 777Email: [email protected]: www.secutech.com

IFSEC International 2013Date: 2013/5/13-5/16Venue: National Exhibition Center,

Birmingham, United Kingdom Tel: +44-20-7921-8057Email: [email protected]: www.ifsec.co.uk

EXPOSEC 2013Date: 2013/5/14-5/16Venue: Centro de Exposições Imigrantes, Sao

Paulo, BrazilTel: +55-11-5585-4355Fax: +55-11-5585-4359Email: [email protected]: www.exposec.tmp.br

ISSE 2013Date: 2013/5/21-5/24Venue: All-Russian Exhibition Center,

Moscow, RussiaTel: +7-495-9374081 ext. 242Email: [email protected] URL: www.isse-russia.ru

Indo Security Expo & Forum 2013

Date: 2013/5/29-5/31Venue: Jakarta International Expo, Jakarta,

IndonesiaTel: +62-21-8644756/85Fax: +61-21-8650963Email: [email protected]: www.indosecurity.com

Safety & Security Amsterdam 2013Date: 2013/6/4-6/6Venue: Amsterdam RAI, Amsterdam, The

NetherlandsTel: +31-20- 549-1212Fax: +31-20-549-1843Email: [email protected]: www.safetysecurityamsterdam.nl

Security Canada West 2013Date: 2012/6/12Venue: River Rock Casino Resort, Richmond,

CanadaTel: +1-905-5130622Fax: +1-905-5130624Email: [email protected]: www.securitycanadaexpo.com

IFSEC South Africa 2013Date: 2013/6/18-6/20Venue: Gallagher Convention Center,

Johannesburg, South AfricaTel: +27-11-8351565Fax: +27-11-4961161Email: [email protected]: www.ifsecsa.com

Electronic Security Expo 2013Date: 2013/6/24-6/28Venue: Nashville Convention Center,

Nashville, TN, U.S.Tel: +1 -508-618-4225Email: [email protected]: www.esxweb.com

November 2012 – June 2013

M102.indd 102 2012/11/30 上午2:22

Page 76: a&s International Dec. 2012 (Trial Version)

F103.indd 1 2012/11/29 上午2:24

Page 77: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F105.pdf 1 2012/11/30 上午2:24

Page 78: a&s International Dec. 2012 (Trial Version)

Expertise in security exhibitions worldwide.

28 Feb.-2 March 2013Mumbai,Indiawww.secutechindia.co.in

International Security Expo

24-26 April 2013Taipei,Taiwanwww.secutech.com

8-10 August 2013Ho Chi Minh City,Vietnamwww.secutechvietnam.com

3-5 July 2013Bangkok,Thailandwww.secutechthailand.com

15-17 January 2013Dubai,UAEwww.intersecexpo.com

15-17 August 2012Buenos Aires,Argentinawww.intersecbuenosaires.com.ar

5 -7 June 2013Buenos Aires,Argentinawww.seguriexpo.com

International Security Expo

F108.indd 1 2012/11/30 上午2:27

Page 79: a&s International Dec. 2012 (Trial Version)

110 DEC 201222 www.asmag.com 22

Companies in This Issue

Next Issue

Viewpoint• MEMOORIBUSINESSINTELLIGENCE

Network Management• ARONSONSECURITYGROUP

Vertical Market•ARONSONSECURITYGROUP•AVIGILON• AXISCOMMUNICATIONS• SIEMENSBUILDINGSOLUTIONS

Special Feature• ABUSSECURITY-CENTER

• ADEMCO(FAREAST)• ASP(GRUNDIGSECURITY)• AXISCOMMUNICATIONS• BOSCHSECURITYSYSTEMS• CDVI• CNLSOFTWARE• ENSECSOLUTIONS• GENETEC• GEUTEBRUCK• HIDGLOBAL• INTELLIGENTSECURITYSYSTEMS• KABA• KINTRONICS• MILESTONESYSTEMS• NADAPSECURITYMANAGEMENT• RSIVIDEOTECHNOLOGIES

• SAMSUNGTECHWIN• SECURITYPRODUCTSFROMSIEMENS

• SIEMENSBUILDINGTECHONOLOGIES• SISTEMASINTEGRALESDEAUTOMATIZACION

• SPARSH• T.M.BIER&ASSOCIATES• TRANSECURE• TYCOINTERNATIONAL• TYCOSECURITYPRODUCTS• VERINTSYSTEMS• XTRALIS• ZICOMELECTRONICSECURITYSOLUTIONS

Product ExplorationAccessControlManagement

Vertical MarketIndustrial

Special FeatureLicensePlateRecognition

M110.indd 110 2012/12/1 上午12:32

Page 80: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F112.pdf 1 2012/11/29 上午2:13

Page 81: a&s International Dec. 2012 (Trial Version)

C

M

Y

CM

MY

CY

CMY

K

F00C.pdf 1 2012/11/29 上午3:03