c m ymalaysiasafe.com/wp-content/uploads/2018/11/malaysiasafe-mar-a… · c m y 68 c m y . c m y 68...
TRANSCRIPT
C M Y K
C M Y K68
C M Y K
C M Y K68
C M Y K
C M Y K1
C M Y K
C M Y K2
Year V • Issue 1 • March-April 2017(72 pages including 4 for cover)
Dear Readers,Greetings from MalaysiaSAFE!The recent spate of deaths in police custody have renewed calls by some to re-
visit the 2005 Police Commission’s recommendation for setting up of an Indepen-dent Police Complaints and Misconduct Commission (IPCMC) to ensure that a code of practice is to be adopted by the police with regard to arresting and deten-tion of persons. The Police Commission had also recommended an independent Custody Officer to be responsible for the welfare and custody of every detainee.
These recommendations were earlier rejected by the police and in lieu, the En-forcement Agencies Integrity Commission (EAIC) was set up with the mandate to educate the police and conduct investigations on other detention officers. The police have also implemented their own mechanism – Integrity and Standards Compliance Department (JIPS) but in spite of this, deaths have still occurred in custody, with 3 already reported this year.
Former Chief Justice Tun Zaki Azmi, who was a member of the Police Com-mission reiterates the need for an IPCMC to make the police force a more profes-sional organization. He says, “A death in custody goes beyond misconduct. It is a criminal act.”
The Human Rights Commission of Malaysia (SUHAKAM) Chairman, Tan Sri Razali Ismail also stressed that the authorities must implement reforms to build a more rights-respecting department. If death in police lockups is deemed unac-ceptable, then the Government should exercise political will and convince the police that the IPCMC can actually protect their interests.
On the national security front, Malaysia’s counter-terrorism efforts and mod-eration agenda have been drawing much attention at the international level, de-spite being a small nation. Most recent is the call from New Zealand to conduct trainings in the field of anti-terrorism and deradicalisation.
New Zealand’s Attorney-General Christopher Finlayson, who is also the min-ister responsible for the country’s security intelligence agencies, was impressed by Malaysia’s preventive approach in combating terrorism and its success in deradicalisation. This, after a similar interest shown last year by India’s Prime Minister Narendra Modi to allow Indian enforcement officers to come to Malay-sia and learn about deradicalisation and rehabilitation efforts.
In this issue of MalaysiaSAFE, we bring you a white paper on using net-work video for setting up a versatile perimeter protection. We also carry a feature article on Best Practices for Smart Commercial Buildings and a few in-teresting case studies on critical in-frastructures. Other notable contri-butions include articles and forecasts by renowned authors/ market survey organisations.
Till our next issue, stay safe and happy reading!
From the Publishers
Mior Roslan Bin Dato Mior Mohd JaafarExecutive Director
HP: +6017-2114492
Executive Director Mior Roslan
Bin Dato Mior Mohd JaafarHP: +6017-2114492
Editor & DirectorMior Mohamed Ridzuan
Bin Mior RoslanHP: +6012-2822312
Advertising and SalesE: [email protected]
Registered Office:PM Security Media Sdn Bhd
(976457 H)B-5-8 Plaza Mont Kiara,
Mont Kiara, 50480, KL, MalaysiaP: +603 2726 2534
Fax: +603 2726 2535Web: www.malaysiasafe.com
Printed by Vinlin Press Sdn Bhd on behalf of PM Security Media Sdn Bhd (976457 H) from B-5-8 Plaza Mont Kiara, Mont Kiara, 50480, KL, Malaysia.
All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, me-chanical, photocopying, recording, or otherwise without the prior written consent of the publisher.
(The views expressed in this magazine are those of the authors and do not nec-essarily reflect those of MalaysiaSAFE.)
C M Y K
C M Y K3
© 2017 Honeywell International. All rights reserved.
For more information please contact us [email protected]
Honeywell International Sdn Bhd1st Floor, Block B, No. 10, Jalan Bersatu 13/446200 Petaling Jaya, Malaysia
Introducing the latest additions to Honeywell’s
Performance Series IP Family…the new, affordable,
and easy-to-install 1080p and 4MP Wide
Dynamic Range IP cameras. Advancing quality
and reliability to the next level, with outstanding
picture clarity and easy system integration. Ideal
for small to medium businesses such as retail
stores, petrol forecourts and medical offices.
What are you waiting for? Make that switch
to IP technology now, with Honeywell’s latest
Performance Series cameras.
Performance Series IP CamerasAre you ready for Better Performance? Better Value?
IR EyeBall
Pancake Micro Dome IR Bullet
IR MFZ EyeBall
IR Rugged Dome
IR Rugged MFZ Dome
Malaysia_SAFE_AD_rev01_0217_V01.indd 1 17/02/17 6:52 PM
C M Y K
C M Y K4
MARcH-APRIl 2017
www.malaysiasafe.comC O N T E N T S
international updates
17-29 65-67application/ case studies
34-46
regional roundup • AxisCommunicationsOpensNewOfficein
KualaLumpur • IFSECSoutheastAsiaAppreciatesBSIA’S
SupportOvertheLast5Years06 GTC–BranchOfficeOpensinVietnam07 AlphafinitySecurestheEasternSugarCane
Factory • NECAppointsNewMDforNECMalaysia • HoneywellMorley–Solutionstohelpyou
EnsureProtectionofAssetsandLife
09 SECON,InternationalSecurityExhibition&Conference
10 D-RONMalaysiaEnterpriseDay2017
11 OTSystems’All-in-OneRapidDeploymentCCTVTrailer
12 AxisCommunicationsLookstoReviveSingapore’sDullRetailScene
05
08
feature articles
47 psiM review and forecast for 2017
3013
50iHs synopses for 2017
Best practices for smart commercial Buildings
2017 thales datathreat report
product sHowcase52 ArecontVision’sCyber-HardenedCameras53 HIKVISIONLaunchHigh-Performance
Explosion-ProofCameraRange54 Sony’sRM-IP500RemoteControllerPTZ
Cameras • SamsungWisenetPSeriesCamera • SurveonBoostsSurveillancePerformance56 AvigilonLaunchesAdvancedSearch
Technology57 MilestoneReleasesHighestPerformingVMS58 Viakoo’sProactiveServicesBoostIntegrators
59 3xLOGICVIGILCentralManagementSoftware
60 ProximTsunami®10100CPEandCPA
• QNAPCinderDriver
• MorseKeyWatcher®atICETotallyGaming2017
62 BarcoSuper-NarrowBezelTiledLCDVideoWalls
63 MoxaOnCellG3150A-LTEGateway
64 PanasonicSmartHomeCameras
61
55
wHite paper
14 drawing the line: network Video for flexible and Versatile perimeter protection
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com5
regional roundup
Axis Communications, the market
leader in network video, had an
official opening and ribbon cutting cer-
emony for their newly revamped office
at Menara UOA Bangsar, Kuala Lum-
pur. Over 30 of Axis’ industry partners
and representatives were in attendance,
including the guest of honor, the Ambas-
sador of Sweden, H.E. Mr. Dag Juhlin-
Dannfelt.
The new office occupies a total
space of over1,500 square feet, giving
Axis the capacity to conduct trainings
for the Axis Certification Program and
demonstrate its all-inclusive end-to-
end solution offerings specifically for
the Malaysian market. The new office
is equipped with a comprehensive so-
lution showcase area where customers
can get a hands-on experience and learn
about the latest cutting-edge technolo-
gies the company has to offer. Those
present during the ceremony
were treated to a live demon-
stration of Axis’ new Q1659
Network camera, the first
to combine professional-
caliber photographic imag-
ing technologies from Canon
with proven surveillance
technology. Also being dem-
onstrated was Axis’ retail
optimization solutions from
Cognimatics.
Mr. Magnus Zederfeldt,
Regional Director for South Asia Pacific
at Axis says, “Actually the opening of
this new office is the culmination of six
years of being in Malaysia already. Why
we are putting more investments to grow
within this region is because we realize
that the end-users are starting to under-
stand what a quality integrated solution
is all about. We can see that in Malaysia
it is growing for the past two years, and
therefore I am very excited about the
company’s prospects here. There are a
lot of opportunities for all of us, so we
are looking forward to a bright future
ahead.”
Axis Communications has a strong
presence in the South Asia Pacific re-
gion, with branch offices in countries
such as Australia, Singapore, Indonesia,
Malaysia, Philippines, Thailand and Vi-
etnam. As part of its long-term growth
strategy, the Sweden-based company
plans to expand even further in the fu-
ture to better serve local markets.
axis communications opens New Office in Kuala Lumpur
ifsec southeast asia appreciates Bsia’s support over the last 5 YearsIFSEC Southeast Asia, the most prom-
inent security industry event in the
ASEAN region, appreciates the BSIA
team for their continued and invaluable
support over the last 5 years. IFSEC
South East Asia is a highly successful
extension of the world leading IFSEC
brand and provides UK security suppli-
ers with a unique opportunity to meet
with new and existing customers from
the region.
Simon Mills (Group brand director
for IFSEC International) commented,
“We are delighted for the continued sup-
port by the BSIA, UK Pavilion and UK
companies. We look forward to working
with you all in 2017 and would like to
say a special thank you to the BSIA for
regional roundup
(Left to right): Jonathan Keat, Distribution Sales Manager ASEAN with Magnus Zederfeldt & Winston Goh
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com6
regional roundup
their continued support.”
IFSEC Southeast Asia provides ven-
dors with the chance to meet with over
10,000 customers from over 51 coun-
tries, all under one roof, where the con-
centration is firmly focused on security
and fire safety. It is the perfect place to
showcase your products face to face to
the entire buying chain, with 86% of all
visitors empowered with purchase mak-
ing authority.
A blend of leading UK security and
fire safety companies will come together
for a dedicated UK Pavilion showcasing
the latest products on offer as well as the
expertise and innovation associated with
the UK’s security and fire industries.
Participating companies include world
leaders in their fields such as Apollo Fire
Detectors, Cova Security Gates, FFE,
HAES Systems and TDSI.
IFSEC Southeast Asia will next take
place 6-8 September 2017 at the Kuala
Lumpur Convention Centre.
GTC, a Malaysian manufacturer of
surveillance solutions and security
software recently announced the open-
ing of their branch office in Ho Chi Minh
City, Vietnam. Located at the Tecapro IT
Building in Tan Binh District, the new
office was set up to manage projects se-
cured in Ho Chi Minh City, Hanoi and
Danang. The grand opening was offici-
ated by the Consul General of Malaysia
H.E Mr. Sofian Akmal. Also present
were Mr. Yazrin Syakhairi, Vice-Consul
(Trade), YBhg. Dato Theng Bee Han,
President of Malaysia Business Cham-
ber (MBC) Vietnam and members
of MBC.
GTC is a reliable Malaysian
surveillance system which is en-
dorsed by the Ministry of Interna-
tional Trade and Industry (MITI),
Malaysia External Trade Develop-
ment Corporation (MATRADE),
and Ministry of Domestic Trade
Cooperative and Consumerism
(MDTCC). The company was
awarded the SME Excellence
Award in 2016 by the ASEAN business
Advisory Council of Malaysia.
Mr. TT Teoh, Managing Director of
GTC said, “We are always improving our
products and services to maintain con-
sumer’s trust and earn the privilege of
being the first choice brand of security
providers from Malaysia. We assure you
that our continuous excellent service
and innovation will justify your confi-
dence in GTC.”
Having a global presence through
export and franchise in more than 10
countries such as Australia, China,
Chile, Cambodia, Egypt, India, Indo-
nesia, Italy, Middle East, Singapore,
Sri Lanka, and Thailand, the opening of
their new office aims to explore other
new markets in Vietnam.
For more info: www.gtc.my
GTC – Branch Office Opens in Vietnam
H.E Mr. Sofian Akmal, Consul General of Malaysia (left) with Mr. TT Teoh, Founder - GTC (Right)
(From Left-Right) Mr. Lim Chin Keong, Mr Tuan Le, Mr. TT Teoh, Mr. Sofian Akmal, Dato’ Theng Bee Han, Mr Hoang Anh Quang, Mr Pham Minh Tuan & Mr Yazrin Syakhairi Mahlan
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com7
regional roundup
Eastern Sugar and Cane Plc (ESC) -
the largest sugar producer in Thai-
land’s eastern region has manufactured,
and sold sugar and electricity for more
than 56 years. It has adopted the fully
integrated system in running its busi-
ness, utilizing all the raw material parts
including wastes.
Currently, ESC has a cane crushing
capacity of 32,000 tons per day, and has
an electricity generating capacity of 59.8
megawatts, of which 55 megawatts are
generated from its biomass power plant
and the rest from biogas power plant.
ESC also sells 31 megawatts to Elec-
tricity Generating Authority of Thailand
and Provincial Electricity Authority.
Challenge and solution:24/7 central management and monitoring by video wall solution
Alphafinity has never been afraid
of diverse challenges. ESC cov-
ers a large operating area which in-
cludes indoor and outdoor spaces, sugar
manufacturing areas, power generating
plants, offices and surveillance booths.
Alphafinity’s diverse surveillance prod-
ucts can be found across
ESC, even at the power
plant area that operates in
a very high temperature
environment.
For the outdoor zones
and manufacturing ar-
eas, Alphafinity’s I267
Starlight bullet cameras
were installed. The I267
full HD 1080p resolu-
tion in 16:9 and WDR
Extreme 140dB bullet camera provides
crystal clear coverage in bright daylight
and through darkness. Even if the fac-
tory is located in extreme environments
with high temperature range fluctuation,
it is not a problem for the I267 camera
because of its IP-67 rated housing and
wide range working temperature. The
1267 camera is protected against dust
and ensures operation under all weather
conditions.
For Indoor spaces throughout ESC,
the A4131 Starlight dome cameras in-
stalled strategically throughout the area
provide clear imagery regardless of
lighting conditions. The A4131 camera
features Exmor WDR sensor and Smart
IR LED; which can
capture both dark and
bright parts of an im-
age with double shut-
ters, enabling two
frames to be combined
to generate a highly
realistic image.
Besides high qual-
ity network cameras,
a central management
software (CMS) for the control room
is of utmost importance for the whole
security system. Live viewing from all
cameras 24/7 across the ESC is impor-
tant, especially to check on the manu-
facturing status or any intruders around
highly critical areas.
Alphafinity’s VD64 is widely applied
in this project. VD64 is a H.265 4K UHD
hardware decode Linux-embedded video
decoder, offering high performance video
wall decoder solution. It can monitor up
to 64 channels live-view on local display
via HDMI, Display Port and VGA con-
nectors and supports 4K UHD network
camera. It also connects streaming from
both IP cameras or NVR.
Feedback from Senior Engineering
Leader of ESC Security department, Phat
Rattanawan, “The diversity of Alphafin-
ity products allow our company to develop
comprehensive and customized surveillance
solutions to meet the unique requirements. It
was an excellent decision to acquire the high
quality system with user friendly operation.
We can easily expand the system based on
situational and financial requirements in the
future.”
Alphafinity Secures the Eastern Sugar cane factory and power plant in thailand
regional roundup
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com8
regional roundup
Honeywell Morley
has been involved
in the manufacturing and
distribution of fire detec-
tion and alarm equipment
for over 20 years. It is
one of the world’s leading
manufacturers of analogue
addressable control equip-
ment with fully trained
and accredited distributors
and regional support op-
erations around the globe.
Honeywell Morley
has a wide range of prod-
uct portfolio that enables
customers to design and
deliver a fire alarm sys-
tem that best suits the
most complex and pre-
vailing market needs. All
of its fire detection and
alarm control panels are
designed to meet EN-54
relevant part standards
and carry approvals from
international bodies such
as Loss Prevention Cer-
NEC Corporation of Malaysia Sdn.
Bhd. has appointed Mr. Chong
Kai Wooi as its new Managing Director.
He will be responsible for the business
growth and operations of NEC in Ma-
laysia.
Mr. Chong has 22 years of experi-
ence and in-depth understanding of the
IT industry, having held a number of
key roles in sales management, account
management, business development,
consultancy and pre-sales activities
since he started his career in 1994.
He joined Hewlett Packard (M)
Sdn. Bhd. in 2004 and later in 2013, he
was the Head of Consulting for HPE
South East Asia Taiwan & HK Network
Consulting practices. In that regional
role, he drove network transformation
projects with large enterprise custom-
ers, providing effective services that
are critical to manage and streamlining
their business for competitive business
advantage.
During his tenure as the Country Di-
rector of HPE Malaysia, Global Industry
Verticals and Strategic Alliance from
2015-2016, he was responsible for driv-
ing sales growth in the enterprise and
public sector segments and securing the
customers’ adoption of the company’s
products and solutions allowing custom-
ers to achieve competitive business ad-
vantages.
“It is indeed a privilege and honor to
be entrusted with the responsibilities as
the Managing Director of NEC Corpora-
tion of Malaysia, a company that is at the
forefront of technological breakthroughs
and spearheading a brighter world with
its cutting-edge products and solutions.
I look forward to working hand-in-hand
with the staff to spur NEC to greater
heights in Malaysia,” said Chong.
Mr. Chong replaces Mr. Andrew
Lee, who will be leaving the company
at the end of January after more than 5
years in NEC.
NEC Appoints New Managing Director for NEC Malaysia
Honeywell Morley – Solutions to help you Ensure Protection of Assets and Life
regional roundup
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com9
regional roundup
Korea’s leading B2B security exhibi-
tion, SECON, International Security
Exhibition & Conference, will be held on
15-17 March 2017, at KINTEX in Seoul.
With the emphasis on global ‘protec-
tionism,’ countries around the world have
secon, international security exhibition & Conference, takes Place in Korea in March
been actively enacting new laws and seek-
ing to implement enhanced security and
safety countermeasures. It is said that the
world is now entering the fourth industri-
al revolution era, with the emergence of
Artificial Intelligence (AI), the Internet
of Things (IoT), Big Data,
and so forth. As security
threats become more seri-
ous due to the impact of the
fourth industrial revolution,
‘Security’ is becoming the
basic infrastructure of all
industries.
The security indus-
try in Korea is growing
at an annual growth rate
of 5%~10%, and Korea is
seen by the world’s leading
security enterprises as a market that is
playing an important role as a ‘testbed’
for new technologies based on Korea’s
tification Board (LPCB) and locally by
the Fire and Rescue Department of Ma-
laysia (BOMBA).
With a dedicated global research and
development team in Bangalore, India to
deliver continuous product development
and solutions, Honeywell Morley fire
systems meet not only existing customer
needs but is easily scalable to tackle the
challenges of tomorrow.
The Honeywell Morley portfolio com-
prises the following:
● DXC panels which are available in 1,
2 and 4 loop versions.
● Analogue addressable detectors such
as smoke, heat, photo-thermal and
duct detectors.
● Manual call points with unique plug
and play installation concept.
● Addressable alarm sounders and
strobes with anti-tamper and in-build
isolations options.
● Input and output modules.
● Photo thermal IR detectors with
unique multi-criteria sensors which
incorporate photoelectric, thermal
and IR sensing elements.
Benefits of choosing Honeywell Mor-
ley:
1. Scalable & reliable for any applica-
tion.
2. Ease of integration.
3. Simple installation and commission-
ing.
4. Easy maintenance.
Honeywell Morley provides the
ideal solution for small to medium
sized businesses which require fire
safety technology that is cost-effec-
tive, easy to install, operate, and main-
tain. This is important in view of the
fast-evolving mid-market fire indus-
try; a result of rapid urbanization and
increasing investments in Tier 2 and
3 cities. The growth of the industry is
also due to heightened awareness for
fire safety applications as well as the
gradual shift from conventional to ad-
dressable systems by small and mid-
sized installers.
For more info: www.morley-ias.co.uk
● Held at Korea’s larg-est exhibition venue, KINTEX in Seoul, on 15-17 March 2017.
● ITsecurityandphysi-cal security systems covering every indus-try segment, all under one roof.
● Strengthened globalnetwork through co-operation with UBM,the organizer of IF-SEC.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com10
regional roundup
strong IT infrastructure.
Hikvision, the world’s number one
video security enterprise, and Dahua
Technology, China’s top two enterprises,
have announced they will participate in
SECON 2017. In addition, global se-
curity enterprises including Gunnebo,
FLIR Systems, Optex, Honeywell, HID
Global and the leading security enter-
prises from Korea including Samsung
S-1 Corporation, Hanwha Techwin,
Kumho Petrochemical will join the
show. All exhibitors in SECON 2017
will be introducing the latest security
trends as well as showcasing their new
technologies and products.
With a six-year track record, SECON
provides domestic and international se-
curity solutions for buyers from a wide
range of industries and sectors includ-
ing government & public offices, local
government, national defense, finance,
education, security manufacturing, com-
puter/ internet/ telecommunication, SI,
security departments, electronics/ con-
struction, enterprise, services and others.
Of the 44,358 visitors who attended SEC-
ON 2016, 60.8% were C-level executives
or decision makers, and 25.4% of total
visitors were hands-on managers who are
actively involved in security work.
Since its debut in 2012, the number
of exhibitors at SECON has grown by an
average rate of 13% each year. This year,
64% of total exhibitors showed their ea-
gerness to come back to the show by re-
booking their stands for SECON 2017.
It is highly anticipated that the global
network will be strengthened through
close cooperation with the UBM Group,
the international organizer of many
leading exhibitions and conferences.
The UBM Group is well known as the
organiser of ‘IFSEC International,’ one
of the world’s top three security exhibi-
tions, and ‘Black Hat,’ the world’s most
prominent security hacking conference.
SECON offers the optimal business
platform for the security industry by
providing a one-to-one business match-
making service and a hosted buyer pro-
gramme to meet the needs of exhibitors.
These services are the powerful, effec-
tive and intuitive tools allowing exhibi-
tors to search for and arrange meetings
with qualified buyers.
Demand for exhibit space at SEC-
ON 2017 is high with remaining exhibi-
tor booths being sold rapidly.
For more info: www.seconexpo.com
D-RON Malaysia Sdn Bhd recently
hosted its first MALAYSIA EN-
TERPRISE DAY 2017 for end-users at
the cosy yet luxury RAMA V Thai fine
cuisine restaurant in Kuala Lumpur. The
event was organized by D-RON Malay-
sia Sdn Bhd, an entity of D-RON Group,
together with market leading partners
AXIS Communications®, Milestone
Systems© and DELL EMC©.
At the event, Mr Ivan Tan, Deputy
Director of D-RON Group gave the
opening speech which was followed with
the keynote address titled ‘Solutions for
a complex world’ presented by Muham-
ad Khairul bin Kadri, Presales Specialist
of D-RON Malaysia. After a short tea
break, Mr Ng Kiam Hwa, Channel Busi-
ness Manager of Milestone Systems, Mr
Philip Siow, Senior Consultant of AXIS
Communications and Mr Raymond Koh,
d-ron Malaysia enterprise day 2017 - solution for a complex world
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com11
regional roundup
With today’s challenges for an ef-
fective surveillance solution, a
fixed surveillance system can fall short
in keeping families and communities
safe. The current emergence of unpre-
dictable threats within locations with-
out fixed amenities like electricity and
proper lighting calls for a surveillance
system that is highly-mobile and can be
swiftly deployed.
OT Systems has designed and built
a state-of-the-art Rapid Deployment
CCTV Trailer which is intelligent and
user friendly. Available in 3 sizes which
can be deployed for any urgent surveil-
lance need, each cart is equipped with a
customized surveillance system.
From the top of a 6-meter mast, PTZ
ot systems’ all-in-one rapid deployment cctV trailer
Business Development Manager of
DELL EMC took turns to showcase
their world renowned technologies
in surveillance, video management
and data storage solutions. D-RON
MALAYSIA ENTERPRISE DAY
2017 was organised to highlight
the importance of agnosticism in
modern video surveillance solu-
tions, integration, video analytics,
the concept of Internet of Things
(IoT) and the convergence of the
unified security management.
Invited customers from government,
banking, commercial, logistics, transpor-
tation and consultants who attended the
event were impressed with enriching in-
sights on the latest market trends. During
the demonstration showcase, customers
were able to get a hands-on experience
of the integrated solution with the latest
product technologies in the market.
The event ended with a lucky-draw
and group photo session, followed by
delicious lunch provided by RAMA V
restaurant.
For more info: www.d-ron.com
cameras are installed to offer
high quality 360-degree day
& night surveillance and video
analytics. Signals are transmit-
ted remotely by a Wi-Fi or 4G
router up to 50km. A few CCTV
trailers can be deployed simul-
taneously within various loca-
tions to create a modu-
lar surveillance system
with a Rapid Deployment
Command Centre.
Changing incident
locations and the una-
vailability of power
supply on location is not
a problem as the CCTV
trailer can operate on batteries, solar
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com12
regional roundup
Axis Communications aims to rede-
fine local brick-and-mortar store
operations and customer engagement,
with the launch of its video network so-
lution. The new solution offers HD TV
image quality, intelligent video func-
tions and analytic capabilities. These
will support retailers in their efforts to
remain productive, reduce manpower
reliance, gain consumer insights, and
ultimately, win back customers from e-
commerce players.
The changing retail landscape
Traditional retailers are facing chal-
lenging times. Rising rentals, and
the tightening labour market, have led to
higher operational costs for store owners.
Big players, such as New Look, Celio and
Carrefour, have exited Singapore as they
struggle with slow in-store traffic, and
competition against e-commerce players.
As such, in September last year, the
Singapore government introduced the
Retail Industry Transformation Map,
which encourages physical retailers to
innovate and adopt emerging technolo-
gies to enhance customers experience.
“The consumer shift from brick-
and-mortar stores to e-commerce have
undeniably impacted traditional retailers.
However, we believe that brick-and-mor-
tar shops still have a competitive edge
over e-tailers, and that is the human as-
pect of a shopping experience,” says Mr
Magnus Zederfeldt, Director, South Asia
Pacific, Axis Communications, “Cus-
tomers want authentic experiences today,
and it is thus imperative for traditional re-
tailers to leverage emerging technologies
to enhance this. If implemented effective-
ly, brick-and-mortar stores can flourish.”
Key highlights of Axis’ network video solution
Axis’ network video solution is ca-
pable of helping retailers in two
key aspects:
1. Enhancedsecurity
● Axis network video solution pro-
vides high resolution store-wide im-
age coverage that enables retailers
to follow any suspicious behaviour
inside and outside a store, even after
operating hours.
● The new solution is able to distrib-
ute HD TV video over any kind of
IP network or the internet, assisting
investigators with crime and positive
identification.
2. Enhancedcustomerexperience
● When placed strategically, the net-
work cameras can assist retailers in
recording, measuring and better un-
derstanding consumer activity and
buying behaviour.
● Retailers will be able to identify the
popular areas in-store and optimise
the store and display layouts accord-
ingly.
Axis had previously launched its re-
tail solution in the region, and some of its
key customers include Hang Ten in Tai-
wan, and Volkswagen in China. Custom-
ers have feedback that the solution has
not only helped to effectively reduce their
operational costs, but also raised in-store
surveillance and employee productivity.
“Competition against huge e-com-
merce players, such as Alibaba and
Amazon, is heating up. As such, Singa-
pore retailers must focus on delivering
greater value to consumers through the
implementation of digital initiatives in
stores. This will enable local store own-
ers to stand against e-tailers, and bring
about enhanced experience for consum-
ers,” said Mr Zederfeldt.
axis communications looks to revive singapore’s dull retail
scene with Video network solution
power or AC power; which ensures con-
tinuous operation 24/7.
The CCTV trailer comes equipped
with emergency LED illuminator, real
time voice communication, alarms, and
automatic sensors for intrusion. The
CCTV trailer is rugged, weather-proofed
and sturdy enough to remain in place for
semi-permanent applications, providing
stable surveillance for any critical envi-
ronment.
For more info: www.ot-system.com
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com13
feature
Commercial buildings are
evolving to cater to changes
in technology and workplace be-
havior, while presenting new op-
portunities to maximise efficiency
and productivity. Anixter recently
developed the Infrastructure as
a Platform (IaaP) model to help
building managers address the five
key technology areas that form the
building blocks for smart commer-
cial buildings. These five areas are:
managing risk, optimising network
performance, enhancing workforce
productivity, improving space uti-
lisation and enabling the Building
Internet of Things (BIoT).
Risk management
Today there is a strong emphasis on
providing a secure and safe envi-
ronment for the workforce. The trend is
toward a split between reactive security
and proactive security. Proactive secu-
rity anticipates risk and finds solutions
while the threat is still manageable.
Anixter has defined a five-layered ap-
proach to physical security that provides
the ability to deter, detect, delay, defend
and deny at every layer of a commercial
building to mitigate the risk of a breach.
Networkperformance
Forbes estimates that by 2020 there
will be 26 billion devices connected
to the Internet, adding $1.9 trillion in
global economic value through sales
into diverse end markets. More than
ever before, a high-performance struc-
tured cabling system plays an essential
role in operating a smart building. Ver-
satile physical layer connectivity ena-
bles an open system platform, where the
right media selection and cabling topol-
ogy can support multiple applications,
handle increased bandwidth and elimi-
nate network downtime.
Workforceproductivity
Social and economic drivers are plac-
ing a larger focus on how workforce
behavior can be improved with technol-
ogy. Adequate bandwidth is required to
facilitate the explosion of high-defini-
tion video and BYOD environments that
enable collaborative business communi-
cation with seamless network availabil-
ity throughout the building.
Spaceutilisation
According to a CoreNet Global sur-
vey, 63 percent of commercial real
estate managers expected portfolios to
downsize in the next year. With more
employees concentrated in smaller spac-
es and an increasing demand for dynam-
ic, collaborative areas, optimising real
estate effectiveness is important for the
productivity and efficiency of employees
as well as the building itself.
BIoTenablement
Cost and efficiency, life-cycle man-
agement and improved sustainabil-
ity are the main drivers behind the need
to enable a BIoT environment. An intel-
ligent building must be able to address
the challenges of open architecture de-
sign, supplier integration and migrating
to an IP platform.
Anixter will be joined by key suppli-
ers to share its latest product and solu-
tion offerings for these five key technol-
ogy areas.
For more info:
www.anixter.com/asiapacific
Best practices for smart commercial Buildings
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com14
white paper
1. Introduction
Not knowing what is happening to
your property when you are away
is worrisome and discomforting. Yet,
knowing that something has happened,
but not exactly what, can be just as
frustrating, sometimes even worse. Net-
work video surveillance offers versatile
perimeter protection that allows you to
find out what’s going on around your
premises and why, and thereby enabling
resourceful and cost effective protection
of your assets.
2. Traditional measures forperimeterprotection
Safeguarding against trespassing,
theft and vandalism has long been
a part of daily business life. An increas-
ing number of enterprises are also expe-
riencing a growing need for continuous
security operations to counter what they
perceive as a rising global threat level.
To that end, they invest in various
perimeter protection measures, such as
short-distance radar, lasers, ground sen-
sors, motion sensors or motion-sensitive
fence wires. All these technologies per-
form well, and can, under many circum-
stances, capably detect an intrusion and
set off an alarm.
However, all of these systems have
an obvious and significant limitation:
they cannot distinguish between real
and false alarms. So for every alert,
someone – i.e., in-house security per-
sonnel or a security company provid-
ing the corresponding services – has to
decide whether or not a patrol should
be dispatched to the area. Not until
an inspection is carried out can it be
confirmed if there has been an actual
breach of the perimeter, and if this
breach is a threat that needs to be dealt
with, or whether it was caused by some-
thing harmless, e.g., an animal or mal-
functioning equipment.
Such procedures tend to be rather
time-consuming and will – especially if
the false alarms are frequent – eventu-
ally lead to more lax or even dropped se-
curity checks. Consequently, the whole
operation runs the risk of becoming very
expensive without providing any peace
of mind.
3. Network video for aclearpictureandstrong decision support
With network video cameras, on the
other hand, it is possible to build
an intelligent and reliable surveillance
system for perimeter protection. A vast
range of products from the leading sup-
plier makes such IP-based systems very
versatile and high performing, especial-
ly in difficult lighting environments and
in varying and demanding weather con-
ditions. Clear and crisp images facilitate
detection and identification of objects,
people and incidents, thus making it
easier to separate true alarms from false
alarms and other incidents that don’t
require any measures to be taken. Au-
tomated solutions and advanced video
drawing the line: network Video for flexible and Versatile
perimeter protection
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com15
white paper
analytics software can further reduce the
need for monitoring staff.
3.1 Detect - verify - act: How it works
Basically, the main objective for
perimeter protection is to detect a
threat or an intrusion at the earliest pos-
sible stage. However, areas where valu-
able assets sometimes are kept, for in-
stance rail yards, bus depots, car parks or
harbors can pose a significant challenge
for security managers. The sheer size of
these places can be a problem. Lighting
conditions can also be troublesome, es-
pecially during nighttime if there is little
or no electric lighting available.
3.2 First line of defense - thermal network cameras
Modern thermal network cameras
are very sensitive and accurate.
They are unrivaled when it comes to de-
tection, making them ideal in a first line
of defense. Once a suspicious event has
been detected, the thermal camera can
be configured so that it automatically di-
rects a PTZ (pan/ tilt/ zoom) camera to
the right place.
The PTZ camera can be further used
for tracking a perpetrator or any suspi-
cious activity. Tracking can be done in
several different ways, from manual ma-
neuvering by joystick to auto tracking
relying on intelligent video analytics.
Working in parallel, these two camera
types form an unbeatable combination.
As opposed to day/ night cameras,
which use the near-infra red spectrum
of light, thermal cameras do not require
any light at all to operate. Instead, these
cameras are able to detect a person or an
object by visualizing the thermal radia-
tion they emit. This capacity makes the
cameras highly functional in complete
darkness as well as in fog, snow and
other challenging conditions.
Less apparent is their usefulness in
broad daylight. Thermal cameras are
also very efficient when it comes to dis-
covering people or objects that are ob-
scured by complex backgrounds or who
hide in deep shadows. Another advan-
tage is that they cannot be interfered by
bright lights or laser pointers.
3.3 OntopwithPTZdomesandfixedcameras
With thermal network cameras, oper-
ators can detect suspicious activity
around the clock. However, after detection
must follow verification before any deci-
sion on further actions can be taken.
As soon as a threat has been identi-
fied a horn speaker can be used to de-
ter or delay an intrusion by sending out
warnings or messages. Floodlights, si-
rens and similar components can also be
used for deterrence.
PTZ cameras are very adaptable and
can enable an operator to get on top of
a situation very quickly. After an alert,
he can pan and tilt the camera by remote
control and get an overview of the area
in question. From there it is easy to zoom
in on details. State of the art network
cameras deliver sharp images with very
high resolution enabling facial identifi-
cation or license plate recognition even
at very long distances.
There are many situations where
surveillance video with color is an im-
portant factor for successful identifica-
tion. Special low-light technology that
reduces noise and maintains colors even
in very dark conditions is therefore a
useful capability that greatly enhances
the user’s possibility to effectively rec-
ognize and identify people, vehicles and
incidents.
A visual close-up also helps the se-
curity operator to further analyze the sit-
uation at hand. Is the person that caused
the alarm an unwanted intruder with
possible ill intent? Or is it a visitor who
has come astray or is it in fact an author-
ized staff member?
The whereabouts of detected tres-
passers can be followed with a remotely
operated PTZ dome or well-placed fixed
cameras while an employee or a guard
patrol is guided to intercept the perpetra-
tor. Saved video of an intruder’s move-
ments and activities can later prove valu-
able evidence in a trial.
4.Scalable,flexibleandcostefficient
Large surveillance systems can com-
prise countless sensors, cover huge
areas and include a well-equipped com-
mand center with plenty of security per-
sonnel. Many of these large systems tend
to be complex and involve several differ-
ent technologies. Not only can this make
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com16
white paper
them expensive and difficult to manage
but also risk hampering both flexibility
and scalability.
Furthermore, the bigger the site,
the greater the information load will
become, which can make it difficult to
run operations smoothly and effective-
ly. This is particularly evident when it
comes to the task of distinguishing be-
tween alarms and false alarms.
Using network cameras for perimeter
surveillance solves many of these diffi-
culties. A wide range of cameras, acces-
sories and various applications enables
end-users to obtain a comprehensive and
efficient video-based solution. Network
video also comes with a distributed sys-
tem architecture, which eliminates the
need for back-end hardware and makes it
flexible as well as scalable.
Detection and analysis of suspected
intrusions and other critical situations
might be fully or partially automated
with video analytics applications.
Traditional solutions, such as micro-
waves, infra-red or underground sensors,
leave the operator with the difficult chal-
lenge to understand the nature of the threat
every time an alarm is set off. However, if
the alert comes in the form of images it is
much easier for the operator to recognize
and categorize the type of alarm and react
accordingly. There is an immediate visual
understanding of the situation which not
only minimizes the time it takes to make
a well-informed decision but also reduces
the stress load, since false alarms can be
easily identified and ignored.
High system accuracy – i.e., a high
probability of detection in combination
with a low rate of false alarms – makes
guards and other operators more effi-
cient and facilitates alarm management.
Knowing with certainty which alarms
are serious and require immediate ac-
tion and which can be dismissed as false
also render the operator greater peace of
mind and better opportunities to stay fo-
cused. Network video is consequently a
very cost efficient way to improve over-
all security and works equally well re-
gardless if the alarms are handled locally
or remotely.
4.1 Automation - detection without eyes
Network cameras provide the high
quality images needed to enable
advanced features such as video mo-
tion detection, virtual fence or cross line
detection. Compared to a radar or laser
system that is typically installed on the
inside of a fence, a network camera can
be configured to sustain an alarm trigger
outside the fence and thus give an earlier
warning.
Large systems allow even more
advanced configurations and func-
tionalities. For example: Object filtra-
tion which reduces the number of false
alarms by only reacting to objects that
fulfil certain, pre-determined criteria,
such as size and speed etc. Similarly,
conditional alarm requires a number of
rules to be fulfilled before the alarm is
triggered. Another example of a useful
application to minimize false alarms is
masking area, which is a zone within
the camera’s field of view where events
don’t trigger alarms.
The most advanced application in
the market even enables detection of
multiple events occurring simultane-
ously in different places. It can analyze
detected events, then dismiss non-threat-
ening ones and notify security staff of
any potentially critical situations. The
bottom line is accurate detection and a
minimal number of false alarms.
4.2 Automaticnotification
When an alarm is triggered, a real
time notification can be auto-
matically sent to a single or multiple
simultaneous users, either by e-mail or
text. Using a remote viewing app, the
receiver can then see a live stream from
the camera or a recording of the trigger-
ing event. Based on this visual informa-
tion, it is easy to go ahead and decide on
the appropriate action.
IP-based systems are flexible and
scalable as well as being possible to in-
tegrate with other security technologies,
such as access control and motion sensors
etc. Relying on open industry standards
also facilitates the development of a wide
variety of third party applications.
5. Conclusion
Network camera surveillance for pe-
rimeter protection enables you not
only to detect a possible intruder at an
early stage, but it will also help you to
verify the extent and severity of a breach
as well as providing essential visual in-
formation to adopt an appropriate re-
sponse. Furthermore, by checking video
streams, it is easy to distinguish false
alarms from serious intrusions.
The versatility of network cameras, in
combination with many available applica-
tions and video analytics software, makes the
system flexible, scalable and cost efficient.
Finally, avoiding all the work, stress and
problems that are caused by misinterpreted
alarms will also pay dividends – if nothing
else, in the form of a greater peace of mind.
A network camera surveillance sys-
tem doesn’t leave you in the dark.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com17
InternatIonal Updates
Hikvision, the worldwide leader in
innovative, award-winning video
surveillance products and solutions, an-
nounces plan to establish an R&D Cen-
tre in Montreal, Canada and a Research
Institute in California’s Silicon Valley,
California.
“These two major investments un-
derscore Hikvision’s R&D globalisation
strategy and the commitment to provid-
ing innovative, cutting-edge technology
products tailored to the needs of our
Hikvision to establish r&d centre in Montreal and research institute in silicon Valley
worldwide partners and customers,” said
Yangzhong Hu, CEO of Hikvision.
Expected to open in 2017, the Mon-
treal Hikvision R&D Centre will focus
on engineering development. The Sili-
con Valley Hikvision Research Institute
will focus on broad technology research.
Montreal is an ideal location for the
new R&D Centre because of its excel-
lent talent pool and business-friendly en-
vironment. Likewise, the high-tech hub
of Silicon Valley is the logical location
for the Hikvision Research Institute.
Based in Hangzhou, China, Hik-
vision has more than 8,000 R&D en-
gineers, one of the largest in the video
surveillance industry, and it dedicates
about 7 percent of its revenues to R&D.
The R&D Centre and Research Institute
in North American will be the first es-
tablished outside of China. “This move
is part of Hikvision’s global strategy to
advance its local support and service in
regions outside of China,” said Hu.
The increasing demand for bandwidth
technologies requires servers and net-
work hardware to make them more versatile
to compensate multiple migration options
throughout their lifecycles.
Every data center faces the same chal-
lenge: the need to support increasing band-
width demands while meeting the demands
for scalability, flexibility and redundancy. In
an attempt to control the associated costs,
data center planners are looking to use high-
density cabling architectures and computing
equipment to maximize floor space utiliza-
tion. However, given the pace of innovation
in data center internetworking technology,
not designing the structured cabling infra-
structure correctly today may lead to costly
upgrades, increased downtime and reduced
competitiveness in the future.
A standards-based approach
When Anixter created the original
Levels program in the 1990s, it
recognized the challenges designers faced
when attempting to select the correct type
and grade of low voltage communications
cabling necessary to support the emerging
Ethernet protocol being deployed across en-
terprise networks.
Even though the industry has evolved
from those early 10 Mbps systems to estab-
lished industry standards that support the
100 Gbps systems seen in today’s data cent-
ers, the same challenges exist: the myriad of
choices relating to media selection, cabling
architecture and cable management.
Trafficischangingthedata center
Before the advent of cloud and server
virtualization technology, most of a
data center’s traffic traversed from the data
center local area network (LAN) to the wide
area network (WAN). With server virtual-
ization technology, the ability to decouple
the operating systems and programs from
the physical server improves server utili-
zation as multiple virtual sessions can be
hosted on a server. In today’s virtualized
environments, server-to-server communi-
cation accounts for 76 percent of traffic in
the data center1.
This change in traffic has led to a shift
in the top concerns for investment of mid-
market data center operators as the server
capacity demands have increased2:
● Data center connectivity: 82%
● Availability and resilience of data center
power, space, cooling and connectivity:
80%
● Control over the facility: 78%
● Access to the cloud: 75%
Data center road blocks tohigh-performancestructured cabling
Migrating to a high-performance struc-
tured cabling system isn’t as simple
as a rip and replace of the current cabling.
network Migration: High-performance structured cabling
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com18
InternatIonal Updates
Five distinct areas need to be addressed
when evaluating a data center migration:
1. Amortization of cabling investment.
2. Infrastructure complexity.
3. Pace of innovation and adoption.
4. Speed of deployment.
5. Restrictions of legacy systems.
When determining a network mi-
gration strategy, you need to address
these areas while preparing to support
future technologies, whatever they may
be. However, they will certainly require
increased storage, speed, reliability and
responsiveness. In Anixter’s network
migration strategy, it’s important to ad-
dress several criteria within the data
center:
● Cabling topology: importance of design
and cabling systems.
● Media selection: copper and fiber tech-
nology.
● Complexity.
● Switch and general architecture.
● Flexibility: design for growth. For more info: anixter.com/datacenter
1. Source: Cisco; 2. Source: Forrester Research, US Firms <US$500M Revenue, 2014
Six of VIVOTEK’s intelligent IP sur-
veillance products have received the
2017 Taiwan Excellence Awards. The
products recognized include three H.264
models MS8391-EV, MD8563-EH and
APC (Automatic People Counting) camera
as well as the H.265 models, IZ9361-EH,
FE9381-EHV and SD9364-EH. Among
these six products, the SD9364-EH speed
dome camera was nominated for the Tai-
wan Excellence Gold standard award from
an impressive field of 528 products.
Owen Chen, the Chairman of VI-
VOTEK Inc., stated, “We are honored to
receive these Taiwan Excellence Awards.
We would like to express gratitude to
MOEA and Taiwan External Trade De-
velopment Council (TAITRA), the or-
ganizers of Taiwan Excellence Awards
and the honorable judges for their affir-
mation. VIVOTEK, as the leading net-
work surveillance solutions provider in
Taiwan, will continue our commitment
to delivering value-added products and
surveillance solutions, and further ex-
tend our footprint in global market.”
Six of VIVOTEK’s Outstanding IP Surveillance Products recognized by 2017 taiwan excellence awards
VIVOTEK's six award-winning net-
work cameras:
● H.265FullHDoutdoorspeeddome
network camera, SD9364-EH:
Equipped with 250 meters IR illumi-
nators and a 30x optical zoom lens,
the SD9364-EH also adopts VIVOT-
EK’s VAIR (Vari-Angle IR) Technol-
ogy, which is able to automatically
adjust the IR angle of IR illuminators
and provide both a brighter night view
and more consistent illumination.
● H.265FullHDoutdoorzoomlens
networkcamera,IZ9361-EH: Also
featuring VAIR (Vari-Angle IR)
Technology and a 20x optical zoom
lens, the IZ9361-EH is further armed
with IP67, NEMA 4X- and IK10-
rated robust housing, offering a su-
perior level of outdoor protection.
● H.265 5-megapixel outdoor fisheye
network camera, FE9381-EHV:
Equipped with a fisheye lens for 360°
surround view with zero blind spots.
The stylish FE9381-EHV is able to
provide broad coverage of open areas.
It is also designed with full EN50155
compliance to withstand shock, vi-
bration and humidity, making it a suit-
able solution for railway applications.
● 12-megapixel multiple-sensor net-
workcamera,MS8391-EV: Featur-
ing four 3-megapixel CMOS sensors
with a video alignment feature se-
cures superior image quality around
the clock and is ideal for outdoor
wide coverage protection.
● 2-megapixel vandal-proof mobile
dome network camera, MD8563-
EH: With full EN50155 Tx compli-
ance and IP67-rated rugged hous-
ing design, the streamline designed
MD8563-EH maintains stable and
reliable video surveillance during
vehicle movement.
● 3D Depth Technology APC (Auto-
matic People Counting) camera:
Specially designed for the transpor-
tation market, VIVOTEK introduces
APC camera. Utilizing VIVOTEK’s
3D Depth Technology to capture and
analyze passenger traffic with high ac-
curacy thus empowering users to im-
prove their operations and security.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com19
InternatIonal Updates
Leading life safety system manu-
facturer, Hochiki Europe (UK)
Limited, has strengthened its position
in the Italian market by acquiring fire
and security product distributor, De-
vice and Electronic Systems (DES srl).
Located in the historic city of Ve-
rona, DES srl is a distributor of life
safety solutions across Italy, with
many customers situated in the north
of the country. This acquisition allows
Hochiki Europe to expand the DES
distribution channels and further in-
crease its business within the Italian
market.
Hochiki acquires italian fire and security company
As part of the acquisition, the cur-
rent DES team will be retained, op-
erating from its Verona headquarters
and they will continue to service their
existing customers as usual. Hochiki
Europe will be looking to enlarge the
team and expanding the company’s
operation capabilities to support am-
bitious growth plans and an expected
increase in customer demand.
The incorporation of DES srl,
which was completed in January 2017,
comes as part of Hochiki Corpora-
tion’s wider growth strategy, VISION
2017, in which Europe is named as one
of the most important global markets
in terms of business expansion.
Graham Lowe, Director of Sales
at Hochiki Europe said, “By incorpo-
rating DES srl into Hochiki Europe,
new and existing customers across It-
aly will be given greater access to our
range of innovative products through
streamlined and trusted distribution
channels.
“During 2016, we made a number
of strategic investments to support our
growth plans across EMEA and we
will continue with this momentum in
2017, and beyond.”
Airbus Defence and Space has just
been awarded a contract to sup-
ply satellite communication systems for
UGAP, the French public procurement
agency. This 4-year contract covers the
supply of equipment and services for
fixed and mobile satellite communica-
tions (Satcom) in the Ku and Ka fre-
quency bands.
UGAP is a public institution and
the only national procurement agency
in France, serving mainly the state, local
authorities and hospitals. The contract
foresees all public technical services
to use a simple order form for Satcom
equipment and services anywhere on
French territory.
airbus provides satellite communications for the french administration
“As a pioneer in satellite communi-
cation services for governments, we are
pleased to make our expertise available
to the French administration,” said Eric
Souleres, Head of French business at the
Secure Communications business clus-
ter of Airbus Defence and Space.
Airbus Defence and Space’s users of
fixed or mobile (vehicle, trailer, or shel-
ter) Satcom stations include the Interior
Ministry’s General Directorate for Civil
Security and the departmental Fire and
Emergency Response Brigades, plus
about forty French departments.
Satcom enables voice and data com-
munications to be maintained, including
areas without mobile network coverage,
or when these networks are disabled fol-
lowing a natural disaster; or when there
is a risk of high traffic owing to events
such as terrorist attacks or the World
Cup.
Military and governmental users
worldwide benefit from the unique ex-
pertise developed by Airbus Defence
and Space in the field of satellite com-
munications. Besides covering the com-
plete range of frequency bands (L, C,
Ku, Ka, X and UHF), the company pro-
vides military satellite communications
to some of the most high-tech armed
forces in the world, including those of
the UK, France, Germany, Canada, the
US and NATO.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com20
InternatIonal Updates
survey reveals getting sdn live in the data center
is taking longer than expectedBy Cliff Grossner – Ph.D., Senior Research Director & Advisor, Cloud and Data Center Research Practice, IHS Markit
IHS Markit’s data center SDN survey
provides insight into how cloud and
telecom service provider data centers are
evolving for SDN.
Data center SDN deploymentsgoingslowly
Two-thirds of the service providers
participating in our 2016 survey are
still conducting lab trials of data center
SDN, down only slightly from three-
quarters in 2015.
The number of respondents in pro-
duction trials and live deployment in
2016 continued to be lower than expect-
ed by those taking part in the prior year’s
study; see the chart below.
Getting to live production is taking
more time than expected. This means
that the most innovation-driven part of
the market critical for new revenue –
SDN controllers, data center orchestra-
tion and SDN applications – is still wide
open. Although the leaders in the SDN
service provider data center market are
becoming clearer, especially for physi-
cal network equipment, we do not expect
the market to solidify until live deploy-
ments ramp.
Baremetalswitchingstalls
Bare metal switch ports comprise,
on average, 33 percent of respond-
ents’ data center Ethernet switch ports
(the same as our 2015 study). And, on
average, 24 percent of bare metal switch
ports are in-use for SDN, up from 12
percent in the 2015 survey.
The majority of bare metal switches
are still being deployed at large cloud
service providers (CSPs) because skilled
programmers who are adept at dealing
with bare metal switching are required
to ensure success.
By 2018, bare metal Ethernet switch
ports in the data center are expected to
reach 41 percent among operators sur-
veyed.
Service providers name Cisco and
Juniper top SDN vendors.
The leaders in the service provider
data center SDN market are solidifying
for physical network equipment.
In an open-ended question, we asked
respondents whom they consider to be
the top three data center SDN hard-
ware/ software product vendors. Cisco,
the big player in enterprise networking,
was identified as a top-three vendor by
72 percent of respondents, while Juniper
was named by 39 percent of respond-
ents.
Cisco continues to get traction with
its SDN solutions, including with edu-
cational institutions providing online
● Inthedatacenter,labtrialsforsoftware-definednetworking(SDN)arestilldominant over production trials and live deployments.
● Serviceproviderbaremetalswitchingdeploymentshavestalled,butmorebaremetalswitchesarein-useforSDN.
● CiscoandJuniperwerenamedasthetopdatacenterSDNvendorsbyrespondent service providers.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com21
InternatIonal Updates
learning for students, CSPs deploy-
ing self-service portals and enterprises
adopting hybrid cloud architectures.
Juniper, meanwhile, is gaining footing
with its contrail cloud and contrail net-
working solutions.
DatacenterSDNsynopsis
For its 30-page 2016 data center SDN
survey, IHS Markit interviewed ser-
vice providers that have deployed or plan to
deploy or evaluate SDN by the end of 2018
about their plans to evolve their data centers
and adopt new technologies over the next
2 years. Respondents were asked about
SDN deployment drivers, barriers and tim-
ing; expected capex and opex changes with
SDN; use cases; security technologies; ap-
plications; top-rated vendors; and more.
The International Association of
Chiefs of Police (IACP) and Du-
Pont Protection Solutions announced
recently that they inducted 27 officers to
the IACP/DuPont™ Kevlar® Survivors’
Club® in 2016.
The IACP/DuPont™ Kevlar® Sur-
vivors’ Club® honors law enforcement
personnel who, in the course of pro-
tecting the communities they serve,
have survived potentially debilitating
or life-threatening incidents thanks to
their body armor. The 2016 inductees
include officers serving in Colorado,
New York, South Carolina, Tennessee
and other states. The situations they
faced were as varied as the job of law
enforcement itself, but the outcomes
were the same: survival, the chance to
return home to family and continue do-
ing the jobs they love.
“We look forward to working to-
gether with DuPont in the upcoming
year to continue to raise awareness
of the importance of officer safety
practices,” said IACP President Don-
ald W. De Lucca, Chief of the Doral,
Florida, Police Department, “Through
the Center for Officer Safety and Well-
ness, IACP is committed to looking
at officer mental well-being, physical
health and tactical safety through a di-
verse number of programs. DuPont has
been a steadfast supporter of these ef-
forts and is equally committed to keep-
ing officers safe.”
For more than 50 years, DuPont™
Kevlar® has helped keep law enforce-
ment officers safe so they can in turn
help keep their communities safe. The
everyday dangers officers face while
protecting the public make the in-
creased use of body armor essential to
reducing the likelihood of death and
disability.
“DuPont continues to be commit-
ted to research and development of
new technologies with Kevlar® to help
maintain the safety of law enforcement
personnel and improve their chances of
survival in the event of life-threatening
situations,” said Steve LaGanke, Global
Marketing Manager, Kevlar® Protec-
tion, “We’re dedicated to helping protect
those who protect us.”
Founded in 1987, the IACP/Du-
Pont™ Kevlar® Survivors’ Club® has, to
date, honored well over 3,000 officers
whose body armor helped save them
from death or serious injury.
The International Association of
Chiefs of Police is a professional asso-
ciation for law enforcement worldwide.
For more than 120 years, the IACP
has been launching internationally ac-
claimed programs, speaking on behalf
of law enforcement, conducting ground-
breaking research, and providing exem-
plary programs and services to members
across the globe.
Today, the IACP continues to be
recognized as a leader in these areas.
By maximizing the collective efforts of
the membership, IACP actively supports
law enforcement through advocacy, out-
reach, education, and programs.
Through ongoing strategic part-
nerships across the public safety spec-
trum, the IACP provides members with
resources and support in all aspects of
law enforcement policy and opera-
tions. These tools help members per-
form their jobs effectively, efficiently,
and safely while also educating the
public on the role of law enforcement
to help build sustainable community
relations.
iacp/ dupont™ Kevlar® survivors’ club® Inducts 27 Officers in 2016
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com22
InternatIonal Updates
Biometric technology company
Zwipe was introduced this week to
major card manufacturers and compa-
nies working in Fintech by Monica Mæ-
land, the Norwegian Minister of Trade
at a seminar organized and hosted by
Zwipe’s partner in Japan, Hitachi High-
Technologies.
The purpose of the visit by the Min-
ister was to meet with Japanese and
Norwegian businesses working together
in Japan seeking to strengthen the strong
cooperation between the two nations.
With an emphasis on innovation, espe-
cially in Fintech, the Norwegian govern-
ment has expressed a strong interest to
support companies like Zwipe.
The cooperation between Hitachi
High-Technologies and Zwipe was for-
malized with the outlook to collaborate
on both technical and business develop-
Brickcom Md/ Vd series ip cameras Obtain ECE R118 Certification
for european, usa & canadian automotive MarketsBrickcom’s MD/
VD mobile cam-
eras are now ECE
R118 certified. As one
of the most accepted
quality affirmations
for products used on
motor vehicles, ECE
R118 stands for more
fire resistance, reli-
ability and trust.
In most parts of
the world, the auto-
motive industry is re-
garded as one of the most conservative
and strictly regulated sectors. This is
especially true with the European auto-
motive market. To cope with such, for
many years Brickcom has dedicated it-
self to transportation
application and suc-
cessfully acquired the
essential certifications
including E-Mark and
EN50155. With ECE
R118 certified under
the Addendum 117,
Regulation No.118,
now Brickcom mo-
bile cameras can be
deployed in almost all
kinds of transportation
applications.
Models that meet the ECE R118
standard are designed in accordance
with the agreement of a vehicle type
which regulates the flammability of ma-
terials in passenger vehicles and requires
particular installations for automotive
appliance safety. Along with IP67, IK10
and EN50155 certification approvals,
Brickcom’s MD and VD Series mobile
cameras are certainly among the best
choices for automotive applications.
What is ECE R118 Certification?
Economic Commission for Eu-
rope (ECE) was set up in 1947
by ECOSOC aiming to promote pan-
European economic integration. The
UNECE Sustainable Transport Divi-
sion provides the secretariat services to
WP.29, the World Forum that incorpo-
rates into its regulatory framework the
technological innovations of vehicles to
make them safer and more environmen-
tally sound.
norwegian Minister of trade introducespartnership between Zwipe and Hitachi
High-tech to Major Japanese companies
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com23
InternatIonal Updates
ment objectives. The Japanese market
for both e-money and payment cards is
fast growing as the people’s preference
to use cash is shifting towards more
secure and convenient alternatives. As
much as 40% of all transactions are cur-
rently made with cash, according to the
Japanese Fintech Association. In paral-
lel with this shift the Japanese payment
industry is recognizing the importance
of adopting open world standards, tar-
geting the Tokyo Olympics in 2020 as
the critical deadline for changes. This
activity is supported by the Ministry of
Economy, Trade and Industry (METI).
Additionally, biometric access control
is seeing significant interest in the Japa-
nese market, with many biometric alter-
natives already being adopted.
“At Hitachi we believe in collabora-
tive creation and that is why we have part-
nered with Zwipe. The solutions offered
by Zwipe in regards to payment, access
control and ID provide complimentary
offerings to our already strong and in-
novative solutions mix,” said Ichiro Mat-
suba, General Manager, Electronic Com-
ponents & Materials, adding, “We have
already deployed Zwipe Access solutions
in the market here in Japan and we have
seen significant interest for both Zwipe
payment and ID solutions.”
Zwipe was represented at the semi-
nar by their SVP of Sales and Market-
ing, Einar Boije, who held an hour-long
presentation to potential customers, rep-
resenting major card manufacturers and
companies working in Fintech. The pres-
entation focused on familiarizing the at-
tendees with Zwipe’s offerings as well as
detailing Zwipe’s go-to-market strategy
in Japan.
Speaking on the event, Einar Boije
commented, “We are very honored to be
working alongside our partners Hitachi
High-Technologies and to have such
positive support from the Norwegian
government. Zwipe’s global expansion
strategy is to establish and build strong
partnerships with industry partners who
have significant market impact and a high
level of competence. With Hitachi’s mar-
ket expertise and network we were able to
bring together many important decision
makers in the same room providing our
partnership a real opportunity to take our
business in Japan to the next level.”
LonTrend has launched a new range
of thermal cameras – LTCT03
capable to detect people, objects and
incidents in any hazardous areas at
resolutions up to 640x480 pixels. The
protection is 24 hours unhindered from
pitch dark areas to a sunlit border.
Built in Uncooled Microbolometer
FPA VOx sensor, the cameras integrates
high-performance image enhancement
algorithms. It also features four inno-
vative functionalities for image quality
enhancement: Automatic Gain Control,
Dynamic Image Enhancement, Dy-
namic Range Optimization and Active
Contrast Enhancement. These
features further minimizes the
influence of ‘hot pixels,’ making
images even sharper.
The cameras are available
with several lens options from
f=7.5mm to 50mm, are ONVIF
compliant and PoE supported,
and are easy to install and use.
Specialized in industrial
precision, LonTrend Corporation full-
fills its culture and mission – anticipat-
ing and exceeding customers’ expecta-
tions, and leading the way in die-cast
security devices with cutting edge in-
novations, superior performance and
the broadest selection. With business
spanning over 30 years, LonTrend is a
Taiwan-based precision and manufac-
turing company.
lontrend corporation launches thermal cameras - ltct03 for Hazardous areas
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com24
InternatIonal Updates
The Fujitsu Cloud Internet of Things
(IoT) Platform is helping simplify
and accelerate the design, delivery and
management of high performance IoT-
based solutions – and is now available in
the Europe, Middle East, India and Af-
rica region, as part of the Cloud Service
K5 ecosystem.
Due to disruptive and rapidly chang-
ing market dynamics and customer ex-
pectations, businesses need to be agile
and responsive to remain competitive in
today’s business environment. As organ-
izations undertake digital transforma-
tions and digitalize processes to reinvent
how they operate, they become increas-
ingly reliant on IoT-based solutions to
generate and manage the new sources of
data that can provide truly holistic op-
erational visibility.
Fujitsu developed its Cloud IoT
Platform to address the management of
IoT deployments which can be complex,
time-consuming and can often require
specialist skills. The Fujitsu Cloud IoT
Platform enables customers to remove
complexity and benefit from a compre-
hensive, plug and play cloud-based solu-
tion to integrate selected IoT data into
mainstream business processes.
A rich set of APIs allow the collec-
tion and compilation of data from mul-
tiple sources, and Fujitsu provides a ho-
listic dashboard for managing data from
IoT devices. Consequently, customers
can deploy an IoT platform customized
to their exact needs, with effortless ex-
pansion to accommodate new devices
and data volumes. The straightforward,
pay-as-you-consume pricing structure
also makes financial planning easier and
eliminates the need for upfront capital
expenditure.
Conway Kosi, SVP and Head of
Managed Infrastructure Services at
Fujitsu EMEIA commented, “Very few
organizations buy IoT as a technology.
Customers want solutions to address
specific business needs, or to find a
way of transforming their processes.
In providing a complete, managed IoT
solution, Fujitsu enables them to jump
straight to reaping the benefits of an
IoT deployment, leapfrogging com-
plex and time-consuming planning and
implementation stages as they inte-
grate the data. Fujitsu’s comprehensive
Managed Services portfolio allows us
to partner with our customers, giving
them the opportunity to focus on the
end result instead of becoming over-
whelmed with the process – enabling
them to leverage the valuable IoT data
they have generated as they focus on
transforming their businesses.”
Vernon Turner, SVP and IoT Fel-
low at research company IDC com-
ments, “The IoT market is maturing
quickly. Enterprises around the world
are already integrating sensor data col-
lected and collated by IoT platforms
into production processes. This is
leading to the IoT increasingly becom-
ing accepted as the logical successor
to point solutions based on stand-alone
technologies, such as M2M and RFID.
However, the IoT is quickly reaching
an inflection point where just sensors,
technology and data are not enough
– enterprises need System Integra-
tors to help them combine their sensor
data with existing systems, and create
some meaningful business value from
the sum of the parts. At IDC, we call
this time to value, and our research has
recognized that what customers need
most of all are partners who both un-
derstand and can manage the complex-
ity of integrating IoT into existing IT
systems, with the ability to make the
IoT a valued part of mission-critical
business platforms.”
The Fujitsu Cloud IoT Platform
enables customers to manage sensors
and devices, collect, send and receive
the data generated and analyze this to
make real-time decisions. The platform
is plug and play so customers can easily
adapt it to meet their specific require-
ments. The multi-tenant nature of the
solution means it is cost-efficient and
easy to manage, while a broad-cross
section of functionalities makes it eas-
ier to integrate IoT solutions with one
another.
Fujitsu is providing its Cloud IoT
Platform to customers via its enterprise
Cloud Service K5. This next generation
cloud platform was specifically created
to enable customers to achieve effi-
cient, easy and cost effective enterprise
level digital transformations. Another
core element of IoT is edge computing.
In edge computing particularly related
to M2M and RFID Fujitsu has gained
a proven track record as a System In-
tegrator leveraging its GlobeRanger
iMotion platform. Fujitsu’s extensive
experience of seamlessly integrating
new IoT technology with existing leg-
acy systems makes leveraging business
intelligence data collected by means of
IoT more accessible than ever.
Fujitsu Cloud IoT Platform Simplifies and accelerates enterprise iot
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com25
InternatIonal Updates
At INTERSEC 2017 Maxxess
launched MAXDashboard DI, a
world-first solution that can transform
the live management, monitoring and
verification of people in transit on big,
busy sites and multi-site estates, mak-
ing it quick, easy and affordable to pro-
actively pre-empt security situations,
optimise operational efficiency and cut
costs.
Building on successful pilot trials,
including six-months at a top Middle
East institution, MAXDashboard DI is
attracting strong interest from leading
organisations who want to improve in-
house security capabilities while get-
ting more value from their operational,
human resources and building manage-
ment processes.
Designed by Maxxess, the flexible,
feature-rich solution uniquely combines
multiple data inputs, including access
control feeds, with powerful big data in-
telligence, analytics and algorithms, to
create customised displays with tailored
filters that deliver dynamic live reporting
about the movement of people on-site.
Data is continuously gathered from
multiple sources – then mined, processed
and cross-referenced in real-time with a
wide range of human behaviour patterns
– both general and specific to individual
profiles – to identify anomalies and trig-
ger alerts about potentially suspicious or
unauthorised activity outside the norm.
As a highly versatile, open-source
solution, MAXDashboard DI is vendor-
agnostic, so can be seamlessly integrated
with any existing security system. It is
available as a pay-as-you-go service and
is highly scalable. Without upfront capi-
tal costs or technical barriers, it can be
up, running and delivering results fast.
Because each organisation is differ-
ent, rules and reporting filters are cus-
tomised to suit precise requirements.
The intuitive dashboard displays instant,
at-a-glance visibility of key metrics to
maximise ease-of-use by non-expert,
in-house teams. This makes it easy to
monitor the 24/7 presence, location and
movement of people on site, whether
employees, contractors, guests, del-
egates, visitors or the public, including
precise time of arrival and exit, routes
and dwell times.
This greatly improves operational
efficiency, to quickly verify, for exam-
global launch Big data dashboard to transform
on-site securityGlobal launch at Intersec 2017 builds on pilot trial successes
Maxxess solution to proactively pre-empt security alerts while cutting costs
“Conventional securitymonitoring isbasedona re-active response to historic events. MAXDashboard DIcompletelydisrupts thismodel. Itputs thepoweroflive,real-timemonitoring directly into the hands of your or-ganisation.Bygivingyoucustomisedviewsofyourentiresite,withtheabilitytodrilldowntothegranulardetailyouneed, it instantly visualises howyour vital security andoperationalprocessesareworking,while flaggingwhat
might requiremore attention. Furthermore, by combiningmultiple informa-tionfeedswithpowerfulbigdataanalytics,MAXDashboardDIbringsarichwealthofdata to life, transforming it intopreviouslyunseen intelligence todrivemorevaluefromyourexistingsecurityandoperationsinvestments.”
–LeeCoplandManaging Director, Maxxess, EMEA
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com26
InternatIonal Updates
ple, that the right number of contractors
have checked in to work; precisely how
many cardholders are present on differ-
ent sites; if the number of visitors at an
on-site event matches registration crite-
ria; and that people’s presence in differ-
ent parts of the site complies with their
permitted status – including duration of
visit and access rights.
With self-learning algorithms, the
system continuously recalibrates its cri-
teria based on the latest, most relevant
data. It also references actual behaviours
against known norms. For instance, if a
specific employee changes their regular
route in and out of a building, under-
takes unusual activity on the corporate
network or accesses the site during a
scheduled vacation, these could trigger
alerts for investigation.
The dashboards can also enhance
operational processes such as identify-
ing when parts of a building are most –
or least – active; peak visitor flow times;
or the average Wi-Fi usage per session.
This gives teams the intelligence to
adapt processes, configure networks and
adjust building management systems
accordingly to optimise savings and ef-
ficiencies.”
Based on open system protocols,
MAXDashboard DI can take data from
any standard source including all ac-
cess control systems from any manu-
facturers with no need for bespoke in-
tegration.
consumers increasingly aware of online security risks, but hold Businesses
responsible for data Breaches, finds gemalto study
Gemalto recently released the find-
ings of its 2016 Data Breaches
and Customer Loyalty report, revealing
that consumers put responsibility for
protecting their personal data firmly at
the hands of the organizations holding
their data – and not themselves.
According to the 9,000 consumers
surveyed in Australia, Benelux, France,
Germany, Russia, UAE, Saudi Arabia,
India, Japan, United Kingdom, and
United States, 70% of the responsibili-
ty for protecting and securing customer
data lies with companies and only 30%
of the responsibility with themselves.
Yet, less than a third (29%) consumers
believe companies are taking protection
of their personal data very seriously.
This comes as consumers are becoming
increasingly fearful of their data being
stolen, with 58% believing it will hap-
pen to them in the future. More than 4.8
billion data records have been exposed
since 2013 with identity theft being the
leading type of data breach accounting
for 64% of all data breaches.
Where consumers see most risk
Despite becoming more aware of
the threats posed to them online,
only one in ten (11%) believe there are
no apps or websites out there that pose
the greatest risk to them and consumers
are not changing behavior as a result:
● 80% use social media, despite 59%
believing these networks pose a
great risk.
● 87% use online or mobile banking,
with 34% believing they leave them
vulnerable to cybercriminals.
● Consumers are also more likely to
shop online during busy commer-
cial periods such as Black Friday
and Christmas (2% increase online
versus -2% decrease in store), de-
spite 21% admitting the threat of
cybercrime increases a lot during
these periods.
Consumer attitudes on data breaches
Nearly six in ten (58%) consumers
believe they will be a victim of
a breach at some point, and organiza-
tions need to be prepared for the loss of
business such incidents may cause. The
majority of consumers who currently
use the following, say they would stop
using a retailer (60%), bank (58%) or
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com27
InternatIonal Updates
social media site (56%) if it suffered a
breach, while 66% say they would be
unlikely to do business with an organi-
zation that experienced a breach where
their financial and sensitive informa-
tion was stolen.
How data breaches affect consumers
The study found that fraudulent use
of financial information has af-
fected 21% of consumers, with others
experiencing fraudulent use of their
personal details (15%) and identity
theft (14%). More than a third (36%)
of those who have been a victim of a
breach attribute this to a fraudulent
website. Clicking a bad link (34%) and
phishing (33%) were the next highest
methods consumers were caught by. In
keeping with the theme of putting the
blame at the organization’s hands, over
a quarter (27%) attributed the breach to
a failure of the company’s data security
solutions.
Lack of security measuresinfluenceconsumerconfidence
The lack of consumer confidence
could be due to the lack of strong
security measures being implemented
by businesses. Within online banking,
passwords are still the most common
authentication methods – used by 84%
for online and 82% for mobile banking,
and more advanced transaction security
the next highest for both (50% and 48%
respectively). Solutions like two-factor
authentication (43% online and 42%
mobile) and data encryption (31% on-
line and 27% mobile) trail behind.
Similar results can be seen in both
the retail space, with only 25% of re-
spondents that use online retail accounts
claiming two-factor authentication is
used on all their apps and websites, and
in social media, with only 21% using
the authentication for all platforms.
Only 16% of all respondents admitted
to having a complete understanding of
what data encryption is and does.
“Consumers have clearly made the
decision that they are prepared to take
risks when it comes to their security,
but should anything go wrong they put
the blame with the business,” said Jason
Hart, CTO, Data Protection at Gemalto,
“The modern-day consumer is all about
convenience and they expect busi-
nesses to provide this, while also keep-
ing their data safe. With the impending
threats of consumers taking legal action
against companies, an education pro-
cess is clearly needed to show consum-
ers the steps they are taking to protect
their data. Implementing and educating
about advanced protocols like two-fac-
tor authentication and encryption solu-
tions, should show consumers that the
protection of their personal data is be-
ing taken very seriously.”
● Only 30% of consumers believecompanies are taking their per-sonal data protection very seri-ously.
● 58% of consumers fear theywill be victims of an online databreach.
● 66%wouldbeunlikelytodobusi-ness with organizations respon-sible for exposing financial andsensitiveinformation.
ASSA ABLOY has signed an agree-
ment to acquire LOB S.A., a lead-
ing producer of locks, cylinders and pad-
locks in Poland.
“I am very pleased to welcome LOB
into the ASSA ABLOY Group. The ac-
quisition of LOB delivers on our strat-
egy to grow our presence in emerging
markets,” says Johan Molin, President
and CEO of ASSA ABLOY.
”LOB is a very attractive addi-
acquires loB in polandtion to the EMEA division, thanks
to its well-known brand in Poland
and its large installed base. LOB’s
variety of mechanical security prod-
ucts will complement the fire doors
offered by Mercor and the electro-
mechanical product proposition by
ASSA ABLOY Poland,” says Tzachi
Wiesenfeld, Executive Vice President
of ASSA ABLOY and Head of the
EMEA division.
LOB was established in 1927, is
headquartered in Leszno, Poland and
has some 440 employees.
Sales for 2017 are expected to reach
some PLN 96 million (approx. SEK 210
million) and the acquisition will be ac-
cretive to EPS from start.
The transaction is conditional on
regulatory approval and is expected
to close during the second quarter of
2017.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com28
InternatIonal Updates
The highly acclaimed Milipol Asia-
Pacific Conference, returns this year
from 4 to 6 April 2017 at the Sands Expo
and Convention Centre, with a world
class line-up of international speakers
who will be sharing their latest insights
on the homeland security environment.
Themed ‘Emerging Threats – The Case
for Collaborative Public Safety,’ the
three-day conference will expound on
how governments and private organisa-
tions can build an effective internal and
cross-border collaborative approach in
tackling emerging threats to homeland
security.
“In current times where the threats
are ever present, solutions to national
security have been evolving and devel-
oping in new ways. Public and private
collaborations are no longer an option
but a necessity,” commented Andrew
Marriott, Managing Director of Com-
exposium Singapore, “Through Milipol
Asia-Pacific 2017, we hope that at-
tendees will not only have abetter un-
derstanding of current key challenges,
but also familiarise themselves with the
roles that individuals can play in the ar-
eas of emergency preparedness, preven-
tion, and recovery.”
Through keynotes and interactive
panels, the insightful three-day con-
ference programme will include pres-
entations on three important areas of
ensuring national security, specifically,
Threats and Responses, Protection and
Emergency Management, and Innova-
tion in Tactics and Equipment.
SpeakerHighlights
Leading International industry ex-
perts from Southeast Asia, Eu-
rope, Middle East, and the US form the
line-up of conference speakers for the
upcoming Milipol Asia-Pacific 2017.
Together, they will be discussing on
emerging regional threats, as well as
the ways to mitigate, prevent and react
to them.
Notable speakers who were direct-
ly involved with the critical response
to recent emergencies caused by acts
of terrorism and conflict in countries
like France, Libya, Syria, Malaysia,
Indonesia, Philippines, Myanmar,
Pakistan, India and Bangladesh will
share their first-hand experiences, and
how in the face of emerging and fast
evolving threats, a complex landscape
makes it necessary for the community
to remain vigilant.
Day-1 Threats and Responses
Back at this year’s Milipol Asia-
Pacific 2017, international ter-
rorism expert, Dr Rohan Gunaratna,
Head of International Centre for Po-
litical Violence and Terrorism Research
(ICPVTR), and Professor of Secu-
rity Studies at S. Rajaratnam School
of International Studies (RSIS), and
Nanyang Technological University,
Singapore, will update delegates on
the current and emerging threats in the
Asia-Pacific region.
For the first time in Asia, hear from
the words of key people involved in the
Paris attacks as well as lessons learnt,
from speakers such as Chief Superin-
tendent Eric Gigou, Deputy Head of the
French Police Special Forces anti-ter-
rorism unit, and Chief Superintendent
Dimitri Kalinine, Central Commission-
er of the 3rd Arrondissement and head
of the Night Service Anti-Criminality
Brigade, Paris Prefecture of Police,
France.
Day-2ProtectionandEmergency Management
Learn the evolving roles and work-
ings of Counter-Terrorism Intelli-
gence in regional security from Datuk
Ayob Khan Bin Mydin Pitchay, Head
of the Royal Malaysia Police (PDRM)
counter-terrorism division.
Further anticipated highlights not
to be missed is the exclusive session by
James Le Mesurier, Director of the Syria
Civil Defence support programme. The
White Helmets as they are known are
credited with saving more than 80,000
lives amidst the ongoing crisis in Syria.
In addition to introducing the Develop-
ments in Civil Protection in Syria, he
will also be sharing some of his extraor-
dinary experiences on the ground since
2012.
Day-3 Innovation in Tactics andEquipment
Other panellists include, Director-
General Dr Rakesh Maria, who
will discuss the latest intelligence and
renowned Homeland security experts take the Stage at Milipol Asia-Pacific 2017 Conference
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com29
InternatIonal Updates
with approaching mandates requiring
ECAC Standard 3-approved hold bag-
gage screening capabilities.
Powered by leading-edge Com-
puted Tomography (CT) technology,
Morpho Detection’s CTX family of
EDS are currently in-service around
the world.
Safran Identity & Security, through
its subsidiary Morpho Detection,
announced its CTX 9800 DSi™ ex-
plosives detection system (EDS) has
achieved Standard 3 endorsement from
the European Civil Aviation Conference
(ECAC) with a 0.5 meters per second
belt speed.
While maintaining the same foot-
print and ease of serviceability, CTX
9800 at 0.5 m/sec belt speed reduces
power consumption while improving
uptime, image archiving capability
and total bags per hour (BPH) capac-
ity. Leveraging
increased speed
and the crisp im-
age quality of
the Clarity Data
Acquisition Sys-
tem (DAS), CTX
9800 now reli-
ably screens up
to 1,800 BPH.
Combined with
the compact CTX
5800 and un-
matched global
service footprint,
Morpho Detec-
tion helps all-
sized airports en-
sure compliance
“Developingtheabilitytoscreenholdbaggagefaster,moreeffectivelyandwithsuperiorimagequalityisattheheartofMorphoDetection’scom-mitment to our customers formorethan 25 years. This approval fromECAC gives airports powerful newsecurity capabilities while furthervalidatingtheCTXplatformashav-ingthescalabilitytomeettherapidlygrowingroleairportsareplayingasglobalhubsforcommerce.”
– Moureen SchobertCTX Product Manager,
Morpho Detection
analytics involved in counter-terrorism
intelligence, and Deputy Inspector Gen-
eral (Chief) Monirul Islam from Bang-
ladesh.
In his first conference stage ap-
pearance in Southeast Asia, the man
behind the creation of Dhaka Metro-
politan Police’s special Counter-Ter-
rorism Unit will lead us through the
dark but real issue of the evolving ter-
rorist mindset.
With over 400 attendees from
more than 30 countries expected, the
region’s flagship homeland security
conference supported by the Minis-
try of Home Affairs, Singapore and
the Ministry of the Interior of France
is the premier event for all trade and
professional security practitioners to
attend.
Workshops
In addition to the highlights of the
main conference programme, there
will also be a series of events taking
place concurrently on site, as part of the
Milipol Asia-Pacific exhibition. This in-
cludes the Drone Asia 2017 conference
(5 April), Securex-Asia 2017 (5 & 6
April), and the IED Workshop 2017 (6
April).
Morpho detection’s ctX 9800 achieves ecac standard 3 endorsement at 0.5 Meters per second
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com30
feature
AnalysisMobile credential downloadswilltriple● Approximately 4.5 million creden-
tials were estimated to have been
downloaded in 2016. IHS Markit
forecasts that this number will triple
to around 13.5 million in 2017.
● The reason for the strong growth is
two-fold:
o The market sentiment believes
that, as in other industries, mo-
bile credentials in access con-
trol is not only a strong value
proposition by itself, but mobile
credentials also have the ability
to unlock a more integrated and
better value system for the end
user while also allowing provid-
ers new avenues of services that
can support revenues streams go-
ing forward.
o In addition, mobile credentials
are not competing against the
traditional physical card at this
time and therefore have a poten-
tial market equal to that of smart
cards.
electronic access control iHs Markit predictions for 2017
By Jimmy Dearing – Analyst, IHS Markit
Electronic locks in emerging regions● Electronic lock growth in emerg-
ing countries globally will expand
by about 9 percent. Eastern Europe
and Africa will lead all other regions
with an estimated growth of 17 per-
cent for electronic locks in 2017.
New biometric technologies● Facial recognition will make further
strides towards establishing itself as
the second most popular type of bio-
metric reader.
● Although fingerprint remains the in-
dustry standard for biometrics, facial
recognition and iris recognition are
currently battling it out for the title
of the second most used type.
● IHS Markit forecasts an increasing
interest in facial recognition over
iris recognition. Iris recognition is
more accurate and better suited for
its niche role than facial recognition,
but facial recognition is easier to in-
stall and does not have (unfounded)
concerns for health.
● The market for facial recognition is
predicted to grow rapidly over the
next five years. Although it will not
overtake iris recognition in revenue or
shipments, it will have momentum.
Chinese manufacturers will gain share● Although China’s impact on access
control has been far less profound
compared to video surveillance, Chi-
na will begin to have more influence
on trends across APAC as well as the
global access control market begin-
ning in 2017, IHS Markit predicts.
● In China, new factories crop up seem-
ingly every month. Each new factory
is keen to establish itself in terms of
market share and, as a result, enters
with extremely competitive pricing.
● AliExpress and the increasing number
of English speaking freight-forwarding
companies in Guangdong will also
make it easier than ever for Western
distributors and integrators to acquire
products direct from these factories.
IP-enabledcontrollerswillexperiencedouble-digitgrowth● Global unit shipments of IP-enabled
access controllers will grow at double
the rate of other panel variants in 2017.
● The growth of the market for IP-
based panels reflects greater use of
web-based and online products.
● As access control systems move from
PC-based to mobile-based control
elements, the associated infrastruc-
ture will likely follow suit.
Highlights● Globallyin2017,theaccesscontrolmarketwillincreaseby6.8percent
andexceed$4.2billion.● Access control will continue to play a larger role in enterprise through
deeperintegrationswithvideosurveillance,businessprocessesandIoT.● Mobilecredentialsandbiometricswillbetwoofthetophardwaretrendsto
watchalongwithlogical/physicalintegrationsandremoteservicessuchasaccess-control-as-a-service(ACaaS).
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com31
feature
what to watch for in the digital security Market in 2017
By Don Tait–SeniorAnalyst,IHSTechnology
As people slowly return to their
normal course of activity in 2017,
what is likely to happen in the digital
security market in the months ahead?
IHS Markit predicts the key themes
driving various digital security sectors
this year:
TopTrendsfor2017● India’s decision to scrap all 500 and
1000 rupee notes in November 2016
will transform the digital payments
landscape within the country.
● The embedded SIM (eSIM) market
will develop further in 2017 with
the launch of the eSIM in cellular
handsets. The eSIM will also be-
come more common in areas such as
M2M, wearables and consumer elec-
tronic devices.
● The terror attacks in Nice, Berlin and
Istanbul will bring eID credentials,
border controls and the Schengen
Agreement into sharper focus.
● The IOT space will prove to be a hot
bed of innovation over the next 12
months. NFC will play a pivotal role
in connecting these IOT devices.
Analysis for 2017Indiascrapping1000and500Rupeenotestransforming digital payments● India’s decision to scrap all 500 and
1000 rupee notes in November 2016
will transform digital payments
there. IHS Markit believes that this
decision will dramatically increase
the size of the mobile payments mar-
ket. The move was designed to curb
endemic corruption. But it also had
the effect of accelerating India’s tran-
sition to digital payments, and the
mobile wallet market is expected to
explode to 300 billion rupees ($4.5
billion) by 2022 from 1.5 billion
rupees in 2016. Companies such as
Paytm, Oxigen, MobiKwik and Pay-
UMoney are well placed to take ad-
vantage of this decision. It will also
increase the number of smart and
secure EMV credit and debit cards
in circulation and accelerate India’s
transition to digital payments.
Embedded SIM becoming more mainstream ● The embedded SIM (eSIM) market
will develop further in 2017 with the
launch of the eSIM in cellular hand-
sets. In 2017, growth of SIM card
shipments is projected to slow. The
SIM card market is relatively satu-
rated and the introduction of eSIM
cards will slow this market further.
On the plus side, companion de-
vices such as smart watches, which
incorporate an embedded SIM card,
are projected to benefit SIM card
shipments over the next few years.
There are also other markets such as
automotive, consumer electronics,
M2M and IoT that can benefit from
an eSIM, where its use will become
more common.
● The eSIM can have benefits for dif-
ferent stakeholders of the ecosys-
tem. For consumers it can lead to
lower costs of connected products,
an increase in the number of con-
nected devices and an improved
customer experience and greater
flexibility. For MNO’s, the eSIM
can lead to new market opportuni-
ties in areas such as M2M, IoT and
the connected car. It can also lead to
the reduction in SIM handling, inte-
gration and handling costs. For SIM
card suppliers, there is also the op-
portunity to enter new markets such
as IoT, M2M and the connected car.
A reduction in physical costs is ex-
pected as well.
Electronic identity (eID) credentials on the increase?● The terror attacks in Nice, Berlin and
Istanbul in 2016 have brought eID
credentials, border controls and the
Schengen Agreement into sharper
focus. The Schengen area is com-
posed of 26 European countries with
a common visa policy that have of-
ficially abolished passport and other
types of border control for interna-
tional travel within the area. Some
people have questioned whether or
not Schengen in now fit for purpose
or relevant to today’s circumstances:
o Does the Schengen area need to
tighten its border controls or even
be scrapped?
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com32
feature
o Do individual countries with-
in the Schengen area need to
strengthen their border controls?
o Do governments need to issue
more secure eID credentials to
their citizens?
● IHS Markit believes that the Schen-
gen agreement will not be scrapped
in 2017. The free movement of goods
and people is one of the core values
of the European Union. However, it
does need to evolve. The ongoing mi-
gration crisis and terror attacks have
resulted in some countries such as
Austria, Denmark, Norway, Poland
and Sweden imposing temporary
controls on some or all their borders
with other Schengen countries. This
includes the re-introduction of show-
ing passports and border checks.
● IHS Markit believes that individual
countries may unilaterally impose
border controls on other Schengen
countries in 2017. This could lead
to an increase in demand for border
control equipment and more secure
eID credentials. This would require
government budgets to increase in
order to absorb the costs of these
higher security measures. Also, there
has already been strengthening of the
outer borders of the Schengen area in
countries such as Greece.
IOT devices will be a hot bed of innovation ● The internet of things (IoT) will prove
to be a hotbed of innovation over the
next twelve months. IHS Markit be-
lieves that Near Field Communica-
tion (NFC) will play a pivotal role in
connecting the installed base of 31
billion IOT devices that are projected
to be in use by 2020.
● The connectivity of the IoT will en-
able the seamless communication
among devices. NFC can be used to
help developers utilise internet-ena-
bled devices in an effort to maximize
the benefits of the IoT in daily life.
● NFC provides a simple solution for
connecting IoT devices to a network.
Any device that is lacking a qual-
ity user interface (UI) can be given
user-friendly controls with a single
tap via NFC. In addition to its ease
of use, other benefits include explicit
interaction through close proximity
interactions, read and write capabili-
ties and communication with devices
that are powered down. NFC is a low
cost and low energy solution that
will enhance the IoT experience.
The Refinement of Smart Home at ces 2017
By BlakeKozak–PrincipalAnalyst,SmartHomeandSecurityTechnology,IHSMarkit
AnalysisCameras take center stage● For cameras, the smart home focus at
CES was around facial recognition,
360 degree viewing, security motion
detection and HomeKit (the D-Link
Omna camera).
● Outdoor cameras were featured as
well, with announcements from Bosch
and Ring, each of which had outdoor
cameras connected to outdoor power
sources and integrated with lighting.
Baby monitors were also a trending
item, with NetgearArlo and OneLink
by First Alert, each of which have
advanced features such as air quality
monitoring but the OneLink camera
offers video respiration detection, a
feature that uses non-invasive meth-
ods to monitor a baby’s breathing.
● Overall, the smart home camera mar-
ket continues to expand as suppliers
enhance their portfolio with cameras
designed for various purposes such as
outdoors, indoors, wired, wireless and
cameras with lower price-points. A
few new cameras that were announced
combine several connectivity stand-
ards and automation features into
one device (including voice control),
such as the Somfy One and SmartBe-
ingsWoohoo, which will likely look to
challenge Canary and Piper.
Illumination on bulbs and sensors● Light bulbs such as Lifx provide two
types of illumination, one of which is
infrared to assist with outdoor cam-
eras using night vision. The infra-
red helps the cameras see clearer in
complete darkness, which for battery
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com33
feature
powered cameras, will dramatically
increase battery life. Other light bulb
announcements featured integrated
motion detection and speakers.
● Environmental sensors were also
more pervasive this year at CES.
Devices with embedded tempera-
ture and humidity sensors have been
common place for many years but
there has been a spike in devices with
embedded air quality sensors (VOC
detection). This has also led to an in-
crease in the number of air purifiers,
ranging from portable and stationary
to robots which move through the
home detecting air quality levels, pu-
rifying the air on-demand.
● IHS Markit believes the market for
environmental sensors, especially air
quality sensors monitoring allergens
and pollutants as well as ultraviolet
(UV) will become commonplace in
smart home devices.
Changing business models andmakingthingssimple● In addition to device refinement, busi-
ness models are also changing at
CES. Many of the top service provid-
ers offering smart home have focused
on manufacturing their own devices
in order to create a seamless look and
feel across devices. Although partner-
ships will still hold great importance,
service providers are looking to build
up their own device portfolio and de-
velop proprietary back-end software
and artificial intelligence (AI).
o Two examples of providers tak-
ing this route include Vivint and
Comcast – each of which started
off their smart home venture by of-
fering a mix and match of device
types and device brands – however
each now has its own devices and
backend. Moreover, Vivint an-
nounced its intelligent Sky plat-
form will rely on AI to automate
the home. The consumer simply
answers questions from the system
while it learns behaviors. Alarm.
com announced a similar offering
with its Insights Engine.
● Meanwhile, Comcast continues
to work toward owning the home
through entertainment, recently en-
hancing its voice controlled remote
to allow controlling of lights and
other automatons. Not to be outdone,
ADT announced a partnership with
Amazon which permits users of ADT
Pulse to arm and disarm the security
system through voice control. What
makes this announcement unique is
that the user arms and disarms the
system by telling Alexa a PIN num-
ber. This is significant because there
have been reports of security systems
being armed and disarmed from out-
side the home. This new partnership
provides an additional layer of secu-
rity, which is timed well with the re-
cent IoT security vulnerability news.
● Simplifying smart home was also a
trend. Sigma Designs announced
SmartStart and Comcast is partner-
ing with Cirrent (ZipKey) to provide
quick and easy connection of IoT
devices. IHS believes making smart
home easier to install for the con-
sumer (do-it-yourselfers) as well as
professional installers will remove
one of the biggest barriers to mass
smart home adoption.
● Lastly, voice assistants could be found
at nearly every smart home booth at
CES this year. IHS Markit believes
that voice assistants will become
the new user interface for the smart
home, but the mobile device will con-
tinue to have its place when managing
settings and advanced features.
A maturing market● Overall, there were more than 190 ex-
hibitors with a smart home offering
at CES 2017. Despite this fragmenta-
tion, it is clear the smart home market
is finding maturity in North America.
Suppliers and service providers are
making strides to enrich devices and
the platforms with features consumers
find valuable and can easily install.
● Moreover, industry players are look-
ing to bring the technology and expe-
rience to the consumer through new
channels, such as electronics retail-
ers (Best Buy in partnership with
Vivint), hotels (Wynn in partnership
with Amazon), insurance, utilities,
builders/ real estate (KB Home Cald-
well Banker) and rentals (Airbnb in
partnership with Vivint and August
Lock). As smart home is pushed to
the consumer from all sides, aware-
ness will grow and prices will fall
with one of final hurdles being con-
sumer imagination.
Highlights● Fragmentationof thesmarthome
marketprovedtobeakeythemeat Consumer Electronics Show.Actuallyadifferentmessage–re-finementof themarket–becameapparentduringtheshow.
● Smart home announcementsweren’t just about cameras orlight bulbs. The announcementsfocusedontheconsumeranden-riching the consumer experiencethroughseamlessintegrationsandfeature-richofferings thatcanap-pealtoadiverserangeofneeds.
● Globallyin2016,thereweremorethan80millionshipmentsofsmarthome devices with an installedbase that exceeded 190 milliondevices.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com34
application/ case study
In the last two decades, global eco-
nomic growth has led to tremendous
increase of vehicles in almost every cor-
ner of the world. Reports show that in
cities, most high rise apartment build-
ings have difficulties managing their
parking spaces. ID card issuing, billing,
entrance control and payments can make
the entrance procedure very inefficient.
Traditional smart card management sys-
tem limits the access to those who hold
an allocated smart card. However, cards
could be stolen and the processing of a
lost card can be painful.
With an abundance of experience
in video surveillance, Dahua launches
a new comprehensive and intelligent
car park solution. Dahua Smart Car
Park Solution is based upon video sur-
veillance and video analysis technolo-
gies. Moreover, it is integrated with the
background smart analysis system DH-
DSS4004-EMS. Entrance control with
Dahua Smart Car Park Solution saves
labor cost and is more convenient and
safe.
Dahua Smart Car Park Solution’s
entrance control function is designed
with 4 essential aspects:
● DigitalentrancecontrolviaANPR
camera: Efficiency is largely en-
hanced using ANPR technology.
Authorized vehicles will be identi-
fied by ANPR camera, which reads
car license plates and controls the
gate. For visitors, simply press the
VTT201 video intercom button and
talk to the operator.
● Real-time entrance surveillance
through fast and accurate license
plate recognition: ANPR cameras
ITC237-PU1A-IRHL have a rec-
ognition rate higher than 95%, and
covers all license plate of European
countries. No loop in the system sim-
plifies the installation.
● Fuzzy search of all European car
platesvia4KNVRcamera:Dahua
NVR5208-8P-4KS2 supports 4K
ultra HD resolution (3840x2160) re-
cording, live-viewing and playback.
If you use refine search function, in-
formation including vehicle image,
license plate number, entry & exit
history log, and recorded video will
be displayed in the window. NVR
also supports export of license plate
data strings with exact date, time and
channel to USB memory.
● Smart management via DH-
DSS4004-EMSsystem:Based upon
windows management software,
entrance control with dahua smart car park solution
application/ case study
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com35
application/ case study
background smart analysis system
DH-DSS4004-EMS is specially de-
signed for a management center.
It is cross-functional, easy to use,
and cost effective. The management
center can respond to an emergency
call from the VTT201 video inter-
com, and support search of video
and image by date/ time/ license
plate number from the storage.
Using an advanced technology
(ITC237 ANPR cameras, NVR5208-
8P-4KS2 4K NVR, DH-DSS4004-
EMS smart analysis system etc.),
Entrance Control Function of Dahua
Smart Car Park solution delivers high
efficiency and safe entry into the resi-
dential compound. In addition, this
solution is scalable to expand with
compound infrastructure growth and is
flexible to upgrade with technological
change. More useful functions of will
be added to Dahua Smart Car Park So-
lution soon.
Peel Ports Great Yarmouth is a
modern, multi-purpose port,
based in Norfolk, UK. The port in-
tegrates a new, deep-water outer
harbor, as well as a well-established
river port. With Peel Ports Great Yar-
mouth being a major hub into the
East Anglia mainland, any disruptive
event can have a massive impact on
operations and the flow of movement
within the region. The port operators,
therefore, decided to have a compre-
hensive security monitoring solution
in place in order to safeguard cargo,
infrastructure and people. Using
FLIR’s network-based Video Man-
agement Solution (VMS), the port is
certain to be able to meet the needs
of today’s demands, as well as tomor-
row’s business growth.
Peel Ports Great Yarmouth is stra-
tegically located to serve the Oil and
Gas fields of the southern North Sea
and the existing and planned Offshore
Wind development off the UK East
Coast, and offers the shortest North
Sea crossing between Great Britain
peel ports great Yarmouth opts for future-proof Video surveillance over ip
FLIr’s Latitude VMs efficiently supports Peel Ports in its current and future security needs
and continental Europe. The port has a
long tradition as a general and project
cargo port handling a wide range of
cargoes, including aggregates, cement,
grain, fertilizers, forest products, dry
and liquid bulks, pipeline and onshore
wind farm equipment.
Enhanceportsecurity
The port authorities needed a sur-
veillance monitoring solution for
both the old and new Peel Port areas for
the protection of vulnerable areas such
as entries, exits, jetty areas, storage lo-
cations, loading and unloading areas.
They also wanted to efficiently monitor
the waterways for quick and effective
response times in case of emergency
situations. Another challenge was to
leverage the existing network infra-
structure for integration with the port’s
current analog cameras. All camera
video streams needed to be fed into a
central control room, and further scal-
ing of the camera network within the
town of Great Yarmouth needed to be
possible.
Future-proofvideosurveillance over IP
Peel Ports Great Yarmouth turned to
Check Your Security Ltd., a Nor-
folk-based IP security systems integra-
tor, for the integration of a comprehen-
sive video surveillance system.
Check Your Security offers its cus-
tomers many types of security solutions,
based on discussions and a site survey
to ensure that customers have a flexible
and scalable solution that not only meet
today’s goals, but also can expand as and
when required.
The company opted for FLIR's Lati-
tude VMS, which provides forensic qual-
ity imaging and user-friendly operation
consisting of dedicated, web-based and
mobile client software. The video sur-
veillance solution also includes a wide
range of hardware components, includ-
ing FLIR’s Quasar Quad HD cameras
and older analog cameras coupled with
video encoders from FLIR, offering Peel
Ports many options to efficiently secure
the harbor area.
“The task Check Your Security
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com36
application/ case study
faced was to provide a fully integrated
and comprehensive video surveillance
system in a coastal port environment
that is both harsh and demanding,” said
Richard Musgrove, Harbor Master at
Peel Ports Great Yarmouth, “Check Your
Security offered a solution that met our
challenging operational requirements,
resulting in Peel Ports Great Yarmouth
managing a robust, reliable and scalable
system for today and for the harbor’s fu-
ture growth.”
FLIR’s Latitude VMS
Peel Ports is relying on Latitude,
a powerful and versatile network
based Video Management System
(VMS), designed for organizations of
all sizes. FLIR Latitude allows Peel
Port's control room operators to view,
playback, search and export their video
streams.
Quasar Quad HD imaging
The FLIR Quasar camera line includes
Quad HD resolution and WDR bul-
let cameras that represent an image qual-
ity breakthrough by combining advanced
shutter technology with high megapixel
count. This results in evidentiary-class
video quality in the toughest lighting
conditions. These advanced Quasar mod-
els offer 76 percent more detail than
HD1080, and the same forensic zoom as
legacy 5MP cameras. Utilizing its broad-
cast, motion-processing based architec-
ture, the Quasar Quad HD camera series
delivers predictable storage, lower utility
costs and a reduction in the Total Cost of
Ownership (TCO).
Increased safety in the harbor
With the installation of the FLIR
Latitude VMS and camera sys-
tems, the safety for the staff and the
general public, as well as the operational
efficiency of the harbor, has significantly
improved. The camera systems include
both visual and thermal imaging tech-
nologies, guaranteeing detection in any
environment during all operation times.
Check Your Security was able to lever-
age the existing network infrastructure
through a wireless mesh and a fiber
backbone. The newly deployed system
features centralized processing, with a
flexible and scalable architecture, allow-
ing Peel Ports Great Yarmouth to ensure
24/7 security of the port, even in remote
areas, such as the Old Bridge and Outer
Harbor.
Futureplans
Matt Jones, UK Area Manager at
FLIR Systems, commented on
the installation, “Check Your Security
have utilized many of FLIR’s end-to-
end IP Solutions to enable the highest
level of security and the quickest emer-
gency response times with the technol-
ogy available, allowing Peel Ports to en-
sure there are no operational restrictions
for a seamless transition towards a safer
future. Looking ahead, as Peel Ports con-
tinues to grow and develop as a leader in
its field, Check Your Security and FLIR
Systems will be able to deliver and de-
velop new solutions for a safer, diverse
digital future.”
uniview protected Hilton Hotels and resorts in uae
Uniview provides video surveillance
solutions for three Hilton hotels
and resorts in UAE which are Hilton
Hotel and Spa Resort RAK, Hilton Al
Hamra Beach & Golf Resort, and Hilton
Residence and Village.
Hilton resort and Spa in Ras al
Khaimah is located on the city’s north
side, in the Al Maareedh area. The mul-
ti-award winning resort provides a lei-
surely pace of living, sprawled over 1.5
kilometers of private white sandy beach,
offering the perfect destination for a
family getaway. Hilton Residence and
Village is 5 minutes’ walk from Hilton
resort and Spa in Ras. Hilton Al Hamra
Beach & Golf Resort is an eco-friendly
hotel located in Al Jazirah Al Hamra
area Ras al Khaimah.
Solution
Uniview provided whole video sur-
veillance solution for Hilton Ho-
tel and Spa Resort RAK and back-end
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com37
application/ case study
products for the other two hotels.
In Hilton Hotel and Spa Resort
RAK, more than 300 IP cameras are
installed not only in public areas like
all public entrances and exits, lobbies
and reception, vehicle entry and exit,
parking area, elevator and staircase,
emergency exit but also staff working
areas including water tanks, electri-
cal rooms, gas cylinder areas, kitch-
ens, safe, store, archiving and control
rooms.
In Hilton Al Hamra Beach & Golf
Resort and Hilton Residence and Vil-
lage, NVR516 and disk enclosures are
used to connect and manage Axis cam-
eras, storing videos days and nights.
HighlightsAll-weatheradoptedvideosurveillance: corridor mode, WDR, anti-corrosion
Corridor mode is supported on Uni-
view cameras and highly appropri-
ate for hallway monitor application in
hotels. Using 9:16 vertically oriented
video stream to increase 40% of valu-
able coverage in longitudinal areas such
as corridors or hallways.
In the lobby of the hotel, glass doors
are always the bright background in the
image. Uniview true WDR cameras pro-
vide clear image in this scene.
To consider the Hilton hotel is lo-
cated next to the seashore, Uniview ap-
plies anti-corrosion painting powder and
surface treatment on cameras, which are
also all-weather adopted and can work in
high temperature and humidity.
High level data safety: RAID NVR
In order to keep the system working
with highest safety level, NVR516
provides redundant power supply in
case of electricity failure. For data stor-
age, NVR516 provides different redun-
dant arrays of independent disks like
RAID 0, 1, 5, 6, 10. Even if one of the
HDD is broken by chance, the NVR can
prevent data going missing and rebuild
RAID in a short time.
High density mass data storage: 90 days 7/24 uninterruptedstorage
Built-in 16 SATA interfaces and two
mini SAS interfaces for additional
disk enclosures, NVR516 provides 7x24
hours, 90 days uninterrupted recording
of hundreds of cameras. Such a mass
storage makes it possible and convenient
to search video and events that occurred
a long time ago.
Managementability:upto500 cameras connection
NVR516 supports 128 cameras in-
put and storage for single NVR.
One hotel deploying 4 NVR516 can
easily manage up to 500 cameras cov-
ering all the areas including reception,
lobby, restaurant, square, garden etc.
Guards in the control center watch live
view and get each public corner under
monitoring. Any event or alarm can be
received on occurrence.
As the world’s leading video sur-
veillance solution provider, Uniview
is covering more and more industries
including world-class hotels, shopping
malls, city surveillance, banks, hos-
pitals, educational facilities, factories
etc.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com38
application/ case study
Fluid Management Technology
(FMT), based in Adelaide, South
Australia, has developed a high-tech
system that allows companies to remote-
ly monitor gasoline consumption.
The devices, which are being used
in more than 10 countries, are designed
for fleets of mining, transport, civil con-
struction and municipal vehicles that
regularly undertake long trips.
FMT’s SmartFill GEN2 devices use
driver and vehicle specific identification
keys to unlock the fuel tank. The device
then records how much fuel is put into
the vehicle’s tank. It also accesses the
vehicles odometer readings and cargo
types to calculate fuel requirements.
FMT Managing Director Bob
Thomas said the system, which was fit-
ted to bowsers at fuelling stations, could
be programmed to lock fuel tanks if too
much fuel or if an unscheduled transac-
tion occurred.
“Depending on the key used, things
like odometer statistics, the amount
of fuel used, the name of driver and
other data are sent to a client’s web-
based account where they can track
movement in real-time,” he said.
“In places like the UAE, In-
donesia and Papua New Guinea,
people are buying our products be-
cause of fuel theft, which could in-
crease depending on the fuel prices
there.
“The ultimate solution is that every
key is registered, so if a driver is in-
volved then they will get pulled up but
we are working on additional features to
create a more comprehensive process.”
FMT’s success grew with the imple-
mentation of a diesel fuel rebate in Aus-
tralia, which allowed businesses to claim
exemptions or rebates on fuel excise tax.
The SmartFill allowed businesses to
accurately document fuel consumption
to maximise tax credits.
It has since expanded internationally
to include clients in Indonesia, United
States, Vietnam, New Zealand, Kenya,
New Caledonia, Mongolia and Oman.
Last year it began selling the devices
to the United States Government for use
at its embassy in Nepal and is set to in-
stall another system at its Guatemalan
embassy in the coming months.
FMT has also set up its first US oper-
ational base in Michigan to help service
North America and provide full-time as-
sistance to customers in the region.
Thomas said because of the 14-hour
time difference between North America
and Australia, it meant there was almost
always an FMT employee available to
assist customers.
“We are really focused on increas-
ing our exports and are hoping our move
into the US continues to expand quite
quickly,” he said, “Our products are a
step above the rest and only require a
fifth of the time to install.”
Thomas said the company was now
working on a new nozzle-based identi-
fier that would lock down the tank if it
did not recognise the vehicle taking on
fuel.
internet of things puts Brakes on fuel theft
An Australian manufacturer is using the Internet of things to tackle fuel theft across the globe
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com39
application/ case study
Network visualization expert Bar-
co’s OpSpace operator workspace
solution make inroads in control rooms
around the world. Since October, op-
erators at the new operations control
center of German IT services provider
Finanz Informatik have been experi-
encing how OpSpace helps them work
more comfortably and more effectively
german it services provider chooses Barco’s opspace
and take better decisions faster. In ad-
dition to the 28 units installed at the
Finanz Informatik facility in Germany,
OpSpace is currently being rolled out
at control rooms of other companies in
EMEA, the US, Brazil and APAC coun-
tries.
Finanz Informatik provides pro-
fessional IT services to clients in the
financial sector. Besides offering con-
sultancy and implementation, the com-
pany also increasingly offers Software
as a Service (SaaS) – a service which
includes monitoring the performance
of applications and ensuring their
availability and hence the investment
in a new OCC. “As our operators have
to monitor increasingly complex sys-
To Raise Comfort and Efficiency at its New Control Rooms
3UK, one of the UK’s top mobile
operators, serves 500K subscribers
with Wi-Fi in the London Underground
using Wi-Fi service management solu-
tions from Aptilo Networks.
3UK has experienced significant
month-on-month growth of the service
since first deployed in 2014, with a high
percentage of recurring users, helping
3UK to increase its value to subscrib-
ers and reduce churn especially among
commuters.
3UK, which had no Wi-Fi capabili-
ties prior to the launch, built its Wi-Fi
service from the ground-up using the
Aptilo Managed Service™ through an
existing Wi-Fi access network deployed
across the London Underground by Vir-
gin Media. Mobile users in the Under-
ground stations can register for service
using a customized web portal inte-
grated with 3UK’s my3 customer care
portal. Once registered, the Aptilo Wi-Fi
service management solution remem-
bers users and provides returning users
with a seamless, automatic login.
The operator is using a high-capac-
ity Wi-Fi network to bridge the gap be-
tween 3UK’s leading 4G network and
metro stations where mobile coverage
can be difficult to obtain.
“For 3UK this is a clear win-win;
they reduce costs by deploying through
a third-party network and can provide a
Wi-Fi service which is fully integrated
with existing mobile data services,” said
Frédéric Servat, Regional Account Di-
rector, EMEA, Aptilo Networks.
Aptilo Networks is a leading pro-
vider of carrier-class systems to man-
age data services with advanced func-
tions for authentication, policy control
and charging. Aptilo Service Manage-
ment Platform™ (SMP) has become
synonymous with Wi-Fi service man-
agement and Wi-Fi offload in large-
scale deployments with 100+ opera-
tors in more than 70 countries, and is
a critical component of Wi-Fi calling
and IoT.
Wavesight is a UK based leader in
the design, manufacture and supply of
outdoor wireless network, hybrid energy
and mobile surveillance solutions for the
professional security industry.
Aptilo Enables Wi-Fi for Half a Million 3UK subscribers in the london underground
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com40
application/ case study
A recently opened shopping centre in
Bradford, West Yorkshire, is now
benefitting from an innovative range of
intelligent life safety systems from Ho-
chiki Europe.
The Broadway Shopping Centre,
a large mall in the centre of Bradford
operated by Westfield Corporation, was
opened to the public in November 2015
and currently contains 77 restaurants,
cafes and shops.
As a large retail space containing
more than 570,000 square feet, The
Broadway required a complex multi-
networked fire detection system which
could be quickly and easily accessed
from a number of locations across the
The Broadway Shopping Centre Benefits from intelligent life-safety system
premises. Due to the large number of
stores and thousands of daily visitors,
it was also vitally important for the sys-
tem to be addressable so that the exact
whereabouts of an incident would be
known as soon as possible.
Bradford-based electrical contrac-
tors, Pitts Wilson, were brought in by
Westfield Corporation to specify the
most effective solutions for the project.
The group chose to install an intelligent
fire alarm range produced by leading life
safety system manufacturer, Hochiki
Europe.
As part of the project, worth around
£50,000, more than 1,400 Hochiki Eu-
rope ESP devices were installed across
The Broadway Shopping Centre. This
included 280 optical smoke sensors, 150
wall sounder beacons, 40 base sounder
beacons and more than 100 call points.
Hochiki Europe’s EN 54-23 compliant
Visual Alarm Devices (VADs) were also
installed. The products were manufac-
tured to perform in line with recently
introduced guidelines which set stricter
guidelines on the installation and perfor-
mance of VADs in the UK.
VADs provide a visual indication
of an emergency, in the form of a bright
flashing light, which helps alert peo-
ple who wouldn’t normally pick up on
audible-based fire alarms. In large retail
spaces, this can prove vital for shoppers
tems and budgets are tight, efficiency
really was a key criterion when de-
signing our new control rooms,” said
Mathias Meyer, Project Manager, “As
were ergonomics, collaboration and
OT/IT integration. Barco’s OpSpace
was the perfect match.”
Singlepixelspaceforviewing and control
Launched in 2016, Barco’s OpSpace
is a personal workspace experi-
ence that provides operators with a
single pixel space for viewing, moni-
toring and interacting with a myriad of
remote systems. Operators simply use
one mouse and keyboard to control all
applications, experiencing a complete
overview of the situation from the com-
fort of a single chair. This creates a very
flexible approach to the operator’s job
− allowing better situational overview,
and therefore better decision-making
“We discovered Barco’s OpSpace
and were really impressed,” Ulrich
Reichelt, Control Center Department
Manager recalls, “The innovative tech-
nology as well as its future-proof and
scalable system architecture, which
even integrates with video walls in
their main control rooms, won us over.”
Finanz Informatik equipped 28 work-
places with the OpSpace solution, mak-
ing it easier for operators to manage the
337,000 computers, 24,000 cash points
and 27,000 servers of the 403 saving
banks that need monitoring.
Work more focused, more comfortably and
more intuitively
The installation at Finanz Informa-
tik is the first big install in Germa-
ny. Barco is setting up similar personal
workspaces at control rooms in EMEA,
US, Brazil and APAC.
“Barco developed OpSpace to
make life easier for control room op-
erators and help them raise their pro-
ductivity. The enthusiastic feedback of
OpSpace proves that OpSpace meets
a real market need,” comments Dirk
Hendrickx, VP Operational Collabora-
tion Systems for Barco, “We are excit-
ed to share OpSpace to streamline the
busy workday of control room opera-
tors at Finanz Informatik and all our
other new customers, allowing them to
work in a more focused, comfortable
and intuitive way.”
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com41
application/ case study
To build a comprehensive IP surveil-
lance system for the largest chain
in the convenience retailing industry –
7-Eleven, which opened it’s first store
in the United Arab Emirates in 2015 –
Brickcom’s IP cameras made all the dif-
ference.
7-Eleven, Inc., is one of the well-
known companies in retail. The new
2,000-square-foot store carries over
2,500 products which required a reliable
surveillance system to secure the facil-
ity. Therefore, the integrated security
solution is helping security managers
respond adequately by facilitating the
process of managing multiple staffs and
customers at the same time as manag-
ing shrinkage and theft from outside and
within.
Brickcom’s VD-300Ne and OB-
300Ne IP cameras cooperate with DI-
GIEVER’s central management sys-
tem and NVRs to maximize 7-Eleven’s
ESP range is manufactured to the high-
est international standards, giving users
freedom of choice without compromis-
ing on security.”
who are deaf, hard-of-hearing or wear-
ing headphones.
The 1,400 detectors were interfaced
with the shopping centre’s building man-
agement system using a range of Hochi-
ki Europe’s input and output modules,
which monitor for fire and fault through-
out the premises.
Mark Ellse, fire design engineer at
Pitts Wilson commented, “We chose Ho-
chiki Europe’s innovative range of de-
vices due to their smooth integration with
Advanced electronics panels and graph-
ics software. The plant control modules
also gave us more flexibility
when programming the cause
and effect logic. Aestheti-
cally, the devices fit in very
well with the look of the new
centre.”
Mark Smith, Hochiki
Europe’s UK Sales Manager
said, “The Broadway Shop-
ping Centre in Bradford
breathed new life into the city and now
shoppers can be reassured that it is pro-
tected by state of-the-art life safety tech-
nology. Our intelligent and expandable
benefit. Meanwhile, customers can be
ensured of their personal safety during
shopping at the store, as well.
Brickcom’s VD-300Ne and OB-
300Ne IP cameras are installed on the
store’s ceiling to provide high-quality
overall security. The cameras’ functional
design enabled the retail surveillance
system to be installed quickly with-
out damaging the store’s interior decor.
With wide angle lenses, it ensures zero
dead spot during monitoring to reduce
possibility of vandalism and theft. VD-
300Ne and OB-300Ne IP cameras uti-
lize H.264 compression and Brickcom
i-Mode function, which reduces the bit
ratio compared with other video stand-
ards, and enables better and smoother
video images to be transmitted over the
network. Moreover, equipped with IP67
and IK10 outdoor enclosure, incidents
of vandalism were significantly reduced.
Now Dubai’s first 7-Eleven has been
able to improve the employees’ sense
of safety, as well as enhance their ser-
vice attitude and professionalism, while
meeting the management’s demands for
retail monitoring.
Brickcom security solution for 7-eleven stores in dubai
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com42
application/ case study
nemours children’s Health system selectsHid global solution for electronic
prescriptions of controlled substances to enhance their patient experience
HID Global® has deployed a Drug
Enforcement Agency (DEA)-
compliant and government certified
solution for Electronic Prescriptions
of Controlled Substances (EPCS) at
Nemours Health System. The solution
easily integrates with the Nemours’
Epic Electronic Health Records (EHR)
system to automate their paper-based
prescription system and provide an en-
hanced patience experience. In addi-
tion to increasing overall productivity,
the new system makes pharmacy visits
faster and more convenient for patients
by eliminating the need to obtain paper-
based prescriptions and reducing wait
times.
According to a study by NASS-
COM, the Indian healthcare IT market
is valued at $1billion (about Rs 6,650
crore) and is likely to grow about 1.5
times by 2020. With increasing cus-
tomer adoption, privatization of health-
care and rapid growth of technologies
like predictive analytics and cloud, In-
dia poses tremendous opportunities for
the healthcare IT market. HID Global
has also announced that the solution is
available in India.
Nemours’ previous manual process
was extremely inconvenient for pre-
scribing physicians and they could not
issue prescriptions to patients during
Telemedicine sessions – an otherwise
efficient and real-time means for deliv-
ery of care. “Our mission is to be the
guardians of children’s health and joy,
which also extends to being the guard-
ians of their health information,” said
Bernie Rice, Chief Information Officer
with Nemours Children’s Health Sys-
tem, “To fulfil our mission, we needed
an e-prescribing solution that would en-
able us to provide the exact care our pa-
tients need, when and where they need
it, and that minimized impact on home
and work life while providing all neces-
sary protections for personal data.”
The new HID Global solution pro-
vides the convenience for the prescribing
physician to choose the authentication
mode that best fit his or her workflow
in a given scenario. It empowers Ne-
mours to attach a digital certificate of
ID authentication to a FIPS 140.2 cer-
tified credential, using IdenTrust as the
Certificate Authority for each authorized
prescriber. The HID Global credentials
also include one-time password (OTP)
functionality that allows EPCS authenti-
cation using an OTP, without the need of
a desktop reader.
“HID Global’s vast portfolio of se-
cure identity solutions made it possible
for us to deliver a highly customized
system that addresses Nemours unique
requirements,” said Sheila Loy with
HID Global, “Our goal is to leverage
our comprehensive offering to help or-
ganizations improve their users’ overall
experience while increasing security at
the same time. The new Nemours sys-
tem is a positive reflection of how an
organization can accomplish these twin
objectives using HID Global solutions.”
Nemours Children’s Health System
has reported significant improvements
in their prescribing physicians’ experi-
ence, where they can now quickly and
simply authenticate to write online nar-
cotic prescriptions, in full compliance,
from the hospital, a clinic, other work
locations and from home. The hospital
noted the solution is cost-effective and
easy to support by their IT department
and medical assistants are saving time
in managing requests. Prescriptions can
now be digitally monitored and tracked
to eliminate paper and storage costs,
and they can be sent for fulfilment
prior to patients’ arrival. Investigations
that were previously more difficult and
time-consuming are also faster and
more streamlined with digital docu-
mentation of all prescriptions.
“We are seeing extremely rapid
adoption rates for our new e-prescrib-
ing system, and overwhelmingly posi-
tive feedback since its roll-out,” said
Dr. David West, medical director for
Nemours Health Informatics and the
physician champion for the EPCS pro-
ject, “Based on of the early success
the deployment, we are now exploring
how to leverage the HID Global EPCS
architecture for other valuable capa-
bilities, such as authenticating to VPNs
and enabling remote access using cre-
dentials, key fobs, mobile smartphones,
and other smart devices and one-time
password tokens.”
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com43
application/ case study
Broadband tools strengthen rose parade security
Los Angeles regional Interoperable communications system and Motorola solutions deploy broadband infrastructure, software and devices to protect rose Parade
Motorola Solutions joined law
enforcement, fire and emer-
gency response personnel in using
the Los Angeles Regional Interoper-
able Communications System’s (LA-
RICS) private 4G broadband network
during the 2017 Tournament of Roses
Parade, adding new communications
capabilities and elevating situational
awareness for first responders.
Motorola Solutions built the net-
work for LA-RICS, and it remains
the largest U.S. broadband network
dedicated for public safety. During
the parade the network provided the
latest long term evolution (LTE)-em-
powered tools for many of the 1,500
responders who protected more than
750,000 onlookers in Pasadena, Cali-
fornia, spread over a 5.5-mile parade
route.
Building on last year’s success-
ful broadband demonstration during
the parade, LA-RICS and Motorola
Solutions deployed a wide range of
technology for this year’s parade.
High-definition camera feeds, broad-
band-equipped handheld devices and
software applications worked to-
gether to enable improved information
sharing and communication through
voice, data, pictures and video.
“Protecting this parade brought
together public safety agencies from
around the Los Angeles County re-
gion, and our broadband network pro-
vided a strong backbone to let them
do their jobs even more effectively,”
said John Radeleff, interim executive
director, LA-RICS, “This deployment
helped public safety teams stay in
touch no matter what type of radio or
device they used, helped the command
center staff keep close track of re-
sources and personnel, and ultimately
kept the parade-watching public safer
than ever before.”
Motorola Solutions supported
LA-RICS, the Los Angeles County
Sheriff ’s Department and Los Angeles
County Fire Department along with
other local and federal law enforce-
ment and public safety agencies that
jointly deployed to protect one of the
region’s largest public events. LA-
RICS noted the successful deployment
in its own news release.
Participants used Motorola Solu-
tions APX™-series radios on an AS-
TRO® 25 land mobile radio (LMR)
network along with the broadband
functions of LA-RICS to establish
interoperable communications and
seamless data sharing. Public safety
responders also used Motorola Solu-
tions’ LEX L10 Mission Critical LTE
Handheld devices, VML 750 trunk-
mount modems and a variety of soft-
ware tools on the network to enhance
situational awareness at the parade.
Deputies and officers on the pa-
rade route communicated quickly and
clearly in specific talkgroups using
WAVE™ 5000 Work Group Commu-
nications software that seamlessly and
securely linked LMR and LTE devices
across the LA-RICS network. WAVE’s
push-to-talk function allowed agen-
cies to easily customize talkgroups for
each parade security zone, whether re-
sponders were using broadband smart-
phones, LMR radios or other devices.
“As the country moves closer to
starting construction on a national
broadband public safety network,
we understand the advantages pub-
lic safety agencies can achieve using
broadband technology during events
such as LA-RICS deploying at the
Rose Parade,” said Travis Boettcher,
Vice President of sales, Motorola So-
lutions, “Our software, managed ser-
vices and LTE-enabled devices help
public safety agencies realize the im-
mense potential broadband has to both
keep first responders safe and help
them do their jobs even more effec-
tively.”
The current LA-RICS system,
built with Motorola Solutions strate-
gic partner Ericsson, has more than
70 LTE towers and will have a grow-
ing number of LMR sites to boost the
overall system’s appeal to public safe-
ty agencies as more towers are added.
LA-RICS represents the largest of the
Early Builder projects that are part of
the First Responder Network Author-
ity (FirstNet). As the prime contrac-
tor for LA-RICS, Motorola Solutions
continues its global leadership in
creating public safety broadband net-
works that complement existing LMR
infrastructure.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com44
application/ case study
nec updates postal automation System for Hong Kong Post
Function for reading and sorting addresses written in traditional chinese characters newly introduced
NEC Corporation has introduced a
function for reading and sorting
addresses written in traditional Chinese
characters to the postal automation sys-
tems operated by Hong Kong Post, the
postal administration of the Hong Kong
Special Administrative Region of the
People’s Republic of China.
In recent years, Hong Kong has wit-
nessed a rise in the number of postal
items addressed in traditional Chinese
characters. This has in turn boosted the
need for automated sorting and process-
ing of addresses written in traditional
Chinese characters in addition to those
handwritten or printed in English.
This new function has been intro-
duced to 15 systems delivered to Hong
Kong Post by NEC on several occasions
since 2008 that are currently in opera-
tion at the Central Mail Centre in Kow-
loon Bay. The introduction of this func-
tion enables the automatic sorting and
processing of up to 564,000 postal items
with addresses written in traditional Chi-
nese characters per hour, thereby con-
tributing to the improvement of Hong
Kong Post’s operational efficiency.
NEC has been doing business with
Hong Kong Post for approximately 30
years since the postal operator’s intro-
duction of a postal automation system in
the latter half of the 1980s. The introduc-
tion of this function was made possible
by the high acclaim NEC has received
over the years for its achievements and
technological capabilities.
NEC began developing its postal au-
tomation system business in 1961, and
has since then delivered systems to post-
al operators in more than 50 countries
around the world. In Japan, domestic
postal operators have utilized a function
for reading and sorting addresses written
in Chinese characters as part of postal
automation processing since the 1980s.
The introduction of this function by
Hong Kong Post was made possible by
applying the wealth of know how NEC
has developed in Japan over the years
in reading and sorting addresses written
in Chinese characters. Moreover, it has
resulted in increased efficiency and a re-
duction in the amount of time needed for
processing.
Postal automation system inside the Central Mail Centre
NICE Actimize, a NICE business
and the industry's largest and
broadest provider of a single financial
crime, risk, and compliance software
platform for the financial services indus-
try has been selected by First Tech Fed-
eral Credit Union to implement Actim-
ize Essentials cloud solutions, including
anti-money laundering and fraud appli-
cations. First Tech Federal Credit Union,
a $9.4 billion financial institution, serves
many of the world’s leading technology
companies and their employees.
NICE Actimize Essentials is a
software-as-a-service (SaaS) created to
meet end-to-end anti-money laundering
and fraud detection requirements, pro-
viding multiple best-of-breed modules
that detect and score a range of banking
activity, including transaction monitor-
ing, customer due diligence, watch list
filtering, and Suspicious Activity Report
(or SAR) filings.
NICE Actimize Essentials also offers
integrated case management capabilities
that feature pre-defined workflows and
checklists, as well as pre-defined users
actimize selected by first tech federal credit union to implement financial crime cloud strategy
Actimize cloud essentials provides best-of-breed anti-money laundering, fraud and case management cloud applications
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com45
application/ case study
While the aging population rises with
the declining birth rate, healthcare
has become a crucial issue all over the
world. Security in and around the health-
care institution is always a major concern
due to the open nature of these places and
the sensitivity of hospital operations. To
protect the staff, patients, visitors, as well
as the assets in many areas in the hospital,
the security requirements are much more
stringent than those in regular surveil-
lance applications. Being a professional
solution provider in a vertical application,
Surveon offers complete healthcare solu-
tions, including high-resolution cameras,
enterprise hardware RAID NVR as well
as enterprise VMS with real-time VA to
detect forbidden areas like patient rooms,
protecting the patients and staff from po-
tential risks in time.
Many people, including patients and
their families, medical professionals, and
hospital suppliers crowd many areas in
the hospital every day. Due to the open
nature of healthcare institutions, even
experienced system integrators might
encounter some challenges in some ar-
eas like patient rooms, supply rooms or
medicine pick-up counter, where it needs
much more stringent monitoring than
regular surveillance applications. With
smart image optimizers, Surveon cam-
eras can analyze lighting changes and
automatically adjust the image functions
to ensure clarity can be obtained under
different lightings. Moreover, Surveon
dome cameras support audio in/ out with
phone jacks, providing hospitals an easy
way to record and manage the conflicts or
disputes in the emergency room. Among
Surveon camera selection, 3MP bullet
CAM3471HEM with smart HDR and 3x
zoom autofocus, 2MP indoor dome cam-
era CAM4311S2 with audio in/ out with
phone jacks plus 3MP outdoor speed
dome CAM6471EZ could be the options
in such application.
For medium-large project scale, the
high bandwidth and storage demand of
these cameras could generate major chal-
lenges in terms of overall application qual-
ity and stability. The embedded hardware
RAID accelerator in Surveon NVR en-
sures that the multi-channel cameras have
access to the required bandwidth when
recording images, reducing the instability
often seen when systems are conducting
high I/O operations for extended periods
of time. In addition, through Surveon
Control Center (SCC), the video central
management tool, the advanced electronic
maps and expansion up to eight screens
at the user end can easily meet future de-
mand growth, protecting the patients and
staff from potential threats in time.
Surveon healthcare solutions have
been successfully adopted in city hos-
pital in Macedonia and the Taipei City
Hospital in Taiwan. “Combined with
easy management and excellent cost effi-
ciency, Surveon’s solutions have enabled
us to greatly enhance security around our
premises and thereby boost the overall
operations of the hospital,” said the pro-
ject integrator of City Hospital in Mac-
edonia.
surveon upgrades Hospital security with complete solutions
and roles. This highly secure cloud-based
software-as-a-service combines behavio-
ral analytics and a rules engine to enable
accurate and efficient detection of money
laundering and fraud activities.
“As an institution with a discerning,
technologically sophisticated member
base, it’s vital that our First Tech team
engages with a financial crime solutions
provider like NICE Actimize who can
grow with us and manage our require-
ments across both anti-money launder-
ing and fraud-related concerns,” said
Joseph Harrison, Vice President, Com-
pliance, First Tech Federal Credit Union,
“With NICE Actimize’s industry-proven
experience, we are confident that this
strategy will enable us to meet the de-
manding requirements of regulators.”
“Many solutions built for credit un-
ions don’t effectively scale as their needs
evolve, while others are too costly or
cumbersome for their operations,” said
Cenk Ipeker, Head of NICE Actimize’s
Cloud business, “NICE Actimize Essen-
tials offers the functionality, depth and
upward growth capability necessary for
those institutions to grow and protect
their investment in fighting financial
crime.”
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com46
application/ case study
In expansive community facilities,
the ability to quickly and clearly
notify and relay instructions to visi-
tors during emergency situations is
critical to public safety and security.
When Long Island, New York integra-
tion firm Rapid Motion Technology
deployed a new emergency paging
system at a 100,000-square foot cul-
tural and community center in Brook-
lyn this fall, they selected a Barix
Audio over IP solution, supplied by
its US distributor LineQ, to provide
the flexibility, advanced functionality
and installation efficiency the project
required.
The community center features a
swimming pool, gymnasium and fit-
ness center, and hosts between 500
and 600 visitors at any given time
across five floors plus a rooftop play-
ground area. With no existing paging
system in place, the center’s manage-
ment set out to enhance visitor safety
with a system to play pre-recorded
audio messages throughout the build-
ing or to specific, targeted zones in the
event of evacuations, fires, lockdowns
or other emergency situations.
Brought into the project by Gleis
Security Consulting, Rapid Motion
Technology looked to an IP-based so-
lution to overcome significant physi-
cal challenges. “The building had
fully closed, Sheetrock ceilings, which
made wiring difficult even within indi-
vidual floors,” said Jason Hagler, CEO
of Rapid Motion Technologies, “With
an Audio over IP solution, we were
able to use the facility’s existing CAT6
network infrastructure, avoiding the
extensive work that would have been
needed to run feeds between floors.”
In-depth conversations with LineQ
quickly overcame Hagler’s initial
hesitation about using IP-based au-
dio over the existing network, “I was
concerned about bandwidth impact
on the customer’s other applications,
but the Barix solution shares the LAN
very well with other network traffic.
It requires very little bandwidth, and
LineQ worked closely with me to de-
sign the optimal configuration.”
Seven Barix Annuncicom PS1
desktop IP paging stations are distrib-
uted across the building’s five floors,
rooftop area and central security of-
fice. BarixExstreamer 100 IP audio
decoders, located in equipment racks
on each level, receive and decode the
audio, which Clarity amplifiers by
Valcom then feed to ceiling-mounted
speakers.115 speakers are dedicated
to paging, while integration between
the Barix units and the building’s pre-
existing, Clarity-powered background
music system enables pages to over-
ride music playing over additional
speakers.
Each Barix paging station can
perform an ‘all call’ to every speaker
throughout the building or target just
specific areas assigned to that station,
such as its own floor. “The Barix sys-
tem makes it easy to configure tar-
geted paging zones,” said Hagler, “We
simply gave each Exstreamer receiv-
ing unit a static IP address, and speci-
fied the IP addresses that each Annun-
cicom’s audio is directed to. And if
the customer wants us to modify the
mapping, we just add or change IP ad-
dresses, with no wiring required.”
The Barix solution saved the in-
tegrator and the community center
both time and money. “Using IP audio
saved close to a week that we would
have spent coring through floors and
running wiring, and saved our custom-
er thousands of dollars on labor and
materials,” said Hagler, “The speakers
took most of the installation time, but
we had the Barix solution itself up and
running in under six hours. It’s very
user-friendly, and the technical sup-
port from Barix and LineQ is excep-
tional.”
Hagler was equally impressed with
the end result. “Voice intelligibility is
critical in this type of application, and
the Barix audio is incredibly crisp,” he
said, “From a timeliness standpoint,
the delay from paging until it hits the
speakers is less than 3 or 4 millisec-
onds – you don’t even realize there’s
any delay at all. And for the customer,
the system is easy to adjust or expand
if their needs change. The Barix solu-
tion lived up to all of our expectations,
and I’d definitely use it again.”
lineQ supplies Barix ip paging solution for Multi-story new York community center Audio over IP system enables operational flexibility across multiple targeted paging zones, while
ease of integration saves time, effort and cost
application/ case study
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com47
feature
For CNL Software, 2016 was an-
other big expansion year, we beat
market growth forecasts by a sizable
margin for the second year in a row.
With increased head count, globally,
and escalated sales in both the US &
EMEA, the company has solidified its
position as one of the technology lead-
ers in the global PSIM market. We not
only grew our number of staff, offices,
customers and partners in the last 12
months, but we also developed a great-
er understanding of what is valuable to
our partners and clients. We recognize
and sincerely thank our sales partners,
without whom, we would have not
achieved this level of growth.
ThePSIMmarketin2016
In a year where national security has
been shown to be relatively power-
less against the evolving threat of small
terror cells, the need for coverage of
large scale CCTV, both public space
and private has never been greater. At
a time when almost all police and mass
transit operations are facing reduced
budgets for security operations, mean-
ing fewer feet on the street, there has
been an increased focus on the use of
technology, using digital ‘eyes’ as a
force multiplier for officers and guards.
These eyes on the street, work 24/7/365
with a low cost of maintenance and lit-
tle intervention required. The may not
prevent attacks, but they can assist in-
vestigations and the apprehension of
offenders.
With the increased requirement
for CCTV, however, comes the need
to rapidly retrieve footage from both
public and private systems along with
the problem of integrating ‘legacy’
systems, which, in many cases, is best
served by a PSIM solution. This is not
in itself, a Safe City solution, but it is
a surveillance solution that forms a vi-
tal part of a much wider Safe City pro-
gram. PSIM is a smart way to connect
vast numbers of DVR/ NVR/ CCTV
systems, from multiple vendors, to re-
trieve video of interest for distribution
to the force operatives who require the
information. What has been signifi-
cant in 2016 is the growing number of
law enforcement agencies around the
world who now acknowledge that the
best solution comprises public/ private
co-operation as well as use of phones,
drones and whatever technology gives
them access to video most accurately
and/ or quickly.
With market analysts across the
board predicting very high growth in
the PSIM market – on average about
25%, but some as high as nearly 35%
CAGR, the question is not if PSIM has
a value proposition, but how do the
Systems Integrators (SIs) engage and
work with the PSIM vendors. There are
currently only a limited number of real
PSIM ‘enabled’ SIs, who can handle
from sales enquiry through to imple-
mentation and maintenance support.
The challenge to system integrators
has been the large, complex, one off
solutions that require ongoing mainte-
nance and development, where not just
security and facilities are involved, but
increasingly business process as well.
psiM review and forecast
By KeithBloodworth–CEO,CNLSoftware
for 2017
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com48
feature
Those who have been working with
PSIM are seeing the benefits of their
investment with increased revenue,
increased margin as well as improved
customer relationships.
Predictionsandobservations for the 2017PSIMmarket
Many of the higher end Video
Management Systems (VMS)
and Access Control Systems (ACS)
manufacturers have added 3rd party in-
tegration capability to their solutions,
partly due to market need and partly to
compete with entry level PSIM play-
ers, who mainly offer a ‘Common Op-
erating Picture’ without much added
intelligence, custom GUI designs or
workflow. Entry level PSIM vendors
are finding it harder to demonstrate
additional value to the market as the
integrated solutions from mainstream
VMS companies have an increasingly
good offering at that level. We predict
the demise of some of the ‘pseudo’
PSIM vendors in 2017, as well as an in-
crease in the entry PSIM market share
taken by VMS vendors.
We expect to see ongoing signifi-
cant growth for Enterprise level PSIM
vendors, where PSIM is a customized,
mission critical solution for the client,
with tailored user interfaces, workflows
and standard operating procedures.
Here PSIM is widely recognized as a
requirement of all high-end integration
programs, particularly in the Critical
Infrastructure Protection, mass transit,
Oil and Gas, nuclear and Homeland
Security markets.
Market consolidation andspecialization
The overall acquisition trend con-
tinued during 2016, resulting in
more major consolidation taking place.
Larger global players led on the acqui-
sition front, particularly of IP based
vendors, examples being Konica buy-
ing Mobotix, Honeywell acquired
Xtralis and Axis buying 2N, an emerg-
ing IP based intercom vendor as well
as Cognimatics, a video analytics spe-
cialist in retail solutions. M&A has
been on the rise for some years and this
year has given the security world one
of its largest upheavals with JCI tying
up with Tyco, making a seriously large
global player, and potentially one of
the few global System Integrators.
From the end users view, it is good
that these leading market players are
buying exciting new technologies, in
turn making them more accessible
through their larger distribution net-
works. It may seem odd that Securitas
for example has bought an integrator
(Diebold) as they are best known for
their man guarding business, but per-
haps it is time that companies hiring
out security staff will be investing in
supplying high value technology solu-
tions that could supplement the man
guarding element of their offerings,
providing more value to their clients.
PSIM+Analytics=IncreasedEfficiency
2016 saw the return of several highly
promising technologies which have
failed to deliver to the security market
the first time around. Most notably,
video analytics is back, especially em-
bedded in the camera for live detection
or as a forensic tool to retrieve video
clips needed for post incident investi-
gations.
Where this becomes interesting
is the use of mixed technologies from
multiple vendors to build an end user
application, as required and defined by
a client. This is how PSIM and other
3rd party vendors, particularly analytics
can offer huge reduction in operations,
costs and time by allowing automa-
tion in event identification and process.
Analytics used on their own are not a
solution, but as part of a wider, more
encompassing operation, can add de-
tection and tracking as well as identify
from vast amounts of video data from
multiple vendors.
Security assets saving operationalcosts–watchthisspacein2017
A major development this year has
been the mixed use of security
assets to support business operations.
CNL Software has previously deployed
rail transit solutions with operational
as well as security benefits, but in
2016, we saw this strategy adopted by
port and airport end users. Now, mo-
bile phone and tablets are used to com-
municate to and from the control room,
Whathasbeensignificantin 2016 is the growingnumber of law enforce-mentagenciesaroundtheworld who now acknowl-edge that the best solu-tioncomprisespublic/pri-vate co-operation aswellasuseofphones,dronesand whatever technologygivesthemaccesstovid-eo most accurately and/orquickly.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com49
feature
managing operational incidents in the
field such as accidents, equipment
maintenance and logistics etc. In this
way, security assets are used to support
business operations and pave the way
for even further investments in secu-
rity technology as it is supporting the
business mission. This ‘business’ criti-
cal element will remain the domain of
Enterprise PSIM vendors.
Drones: The double-edged sword
Fast emerging in the first responder
community is the use of low cost
drones, which can be deployed and
utilized as fast and geo flexible CCTV
cameras for incident management of
all types. However, this evolving tech-
nology needs to be managed, to provide
the required information on the situa-
tion as the right time and technology
is now required in the command and
control room for identification and bi-
directional use of this geo located vid-
eo – hence the need for even smarter
PSIM solutions with the ability to take
the workflow elements out of the field
and in the hands of operations staff.
The problem for many control rooms is
that drones are also in the hands of the
criminals, so detection and elimination
will also come to the control room. One
of the major benefits here for PSIM is
the ability to rapidly change and add
new technologies in a fast-changing
world.
Federated solutions for largerenterprises
Users of multiple numbers of con-
trol rooms are now looking for
them to be aggregated and managed
from a central command facility, main-
taining both local and centralized op-
erations. CNL Software has several
very large examples, where this is now
in use and is having a huge ROI on de-
ployment, management of the assets,
Enterprise wide updating as well as
managing all the required information
at all points in the enterprise. DHS,
armed forces, government and minis-
tries are obvious areas in need of this
federated approach to PSIM, and this
is set to grow as a specialization in the
next few years. It is already a complex
market for high end command and
control solutions, however, it is perfect
replacement for expensive bespoke so-
lution.
Tackling the cyber front
No predictions would be complete
without mentioning cyber secu-
rity, especially considering recent at-
tacks. Today, cyber represents one of
the biggest threats to security as large
scale aggregations increase the threat
surface. Partnerships are becoming
catalysts for co-operation between cy-
ber vendors and physical security spe-
cialist, to offer end users a complete
solution. CNL Software, as founder
members of the IoT Security Founda-
tion, is working with the cyber industry
to both understand and meet the chal-
lenges of today and tomorrow. We do
not, however, believe we should be a
cyber vendor, just encompass the best
solutions via our PSIM platform.
Final words
In 2017, Enterprise PSIM will con-
tinue to raise its game in areas that
were once the reserve of defense con-
tractors and semi military companies.
Further expansion into C2i will see
greater levels of intelligence, includ-
ing tracking, slew to cue, aggregation
of sonar and radar, mass communica-
tions, 3D, Federated systems and cus-
tom built applications such as incident
management, for specific verticals.
Many of these will be at a scale that
only dedicated PSIM products will
perform, both defining and confirming
the requirement for PSIM in verticals
where security hugely impacts busi-
ness efficiencies.
PSIM will oppose the industry
trend and in contrast to other secu-
rity systems, its greater capability and
value creation will drive its growth as
opposed to ever reducing prices. Will
2017 be the breakthrough year for
PSIM? Perhaps not, but it will be the
year that many of the global SIs start to
define strategies for their participation
in this growing market – both in impor-
tance and revenues.
Weexpect to seeongoing significant growth forEn-terpriselevelPSIMvendors,wherePSIMisacustom-ized,missioncriticalsolutionfortheclient,withtailoreduserinterfaces,workflowsandstandardoperatingpro-cedures.HerePSIMiswidelyrecognizedasarequire-mentofallhigh-endintegrationprograms,particularlyin the Critical Infrastructure Protection,mass transit,OilandGas,nuclearandHomelandSecuritymarkets.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com50
feature
Thales, a leader in critical informa-
tion systems, cybersecurity and
data security, announces the results of
its 2017 Thales Data Threat Report, is-
sued in conjunction with analyst firm
451 Research. Sixty-eight percent of
respondents have experienced a breach
with 26 percent experiencing a breach
in the last year–both numbers that rose
from last year. Paradoxically, overall se-
curity spending is also up; in 2017, 73
percent of organizations increased IT
security spending – a marked jump from
2016 (58 percent).
Old habits die hard
The report, which is in its fifth year,
polled 1,100 senior IT security ex-
ecutives at large enterprises around the
world and indicates an ongoing dis-
connect between the security solutions
organizations spend money on, and
the ability of those solutions to protect
sensitive data. While 30 percent of re-
spondents classify their organizations as
‘very vulnerable’ or ‘ex-
tremely vulnerable’ to data
attacks (and the number
of breaches continues to
rise) the two top spending
priorities are network (62
percent) and endpoint (56
percent) protection solu-
tions. Counterintuitively,
spending on data-at-rest
solutions (46 percent)
comes last.
Garrett Bekker, senior analyst, in-
formation security at 451 Research and
author of the report says, “One possible
explanation for this troubling state? Or-
ganizations keep spending on the same
solutions that worked for them in the
past but aren’t necessarily the most ef-
fective at stopping modern breaches.
Data protection tactics need to evolve to
match today’s threats. It stands to reason
that if security strategies aren’t
equally as dynamic in this
fast-changing threat environ-
ment, the rate of breaches will
continue to increase.”
CompliancethetopdriverforITsecurityspending
The reasons behind secu-
rity spending decisions
are varied, but the key driver
remains constant: compliance.
2017 thales data threat report security spending decisions leave
sensitive data VulnerableDespite rise in breaches, companies still prioritizing network and
endpoint solutions over encryption
THE BIGDISCONNECT
2017 DATA THREAT LANDSCAPE
“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”
—Garrett Bekker, 451 Principal Analyst, Information Security
BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING
56%Endpoint
and mobile
62%Network
52%Analysis and
correlation tools
46%Data at rest
51%Data in motion
GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS
WHAT TO DO ABOUT IT
BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED
DISCONNECT
Had a data breach: Increasing IT Security spending to protect data:
Vulnerable
68%61%
88%
2016 2017
In the last year:
26%21%2016 2017
30% Very or Extremely Vulnerable
2015 2016 2017
73%
54% 58.5%
46%44%
Vulnerable90%
29%Very or Extremely
UNITED STATES
Least vulnerable77%
19%Very or Extremely
BRAZIL
1
DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY
DISCONNECT
2
BUILD IN DATA SECURITY FROM THE START
REPRIORITIZEYOUR IT SECURITY TOOL SET
DISCONNECT
3
Believecompliance will prevent
data breaches
20162017
Compliance is the top priority for IT security spend of the last two years:
59%
of IT security professionals are deploying advanced technologies without the required data security
63%
57%49%
47%44%
39%31%
19%9%
SaaSIaaS
Big DataPaaS
Mobile AppsIoT
ContainersBlock Chain
Enterprise use of sensitive data within advanced technology environments
11 DISCOVER AND CLASSIFY
2
Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity
Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT
DON’T JUST CHECK OFFTHE COMPLIANCE BOX
33
ENCRYPTION AND ACCESS CONTROL4
Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments
Encryption needs to move beyond laptops and desktops
Containers: Encrypt and control access to data - within containers and underlying storage
IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats
Data center: File and application level encryption and access controls
Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS
Big Data: Encryption and access control within the environment
CLICK TO DOWNLOAD REPORT
FOLLOW US ON:
Most vulnerable95%
45%Very or Extremely
GERMANY
THE BIGDISCONNECT
2017 DATA THREAT LANDSCAPE
“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”
—Garrett Bekker, 451 Principal Analyst, Information Security
BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING
56%Endpoint
and mobile
62%Network
52%Analysis and
correlation tools
46%Data at rest
51%Data in motion
GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS
WHAT TO DO ABOUT IT
BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED
DISCONNECT
Had a data breach: Increasing IT Security spending to protect data:
Vulnerable
68%61%
88%
2016 2017
In the last year:
26%21%2016 2017
30% Very or Extremely Vulnerable
2015 2016 2017
73%
54% 58.5%
46%44%
Vulnerable90%
29%Very or Extremely
UNITED STATES
Least vulnerable77%
19%Very or Extremely
BRAZIL
1
DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY
DISCONNECT
2
BUILD IN DATA SECURITY FROM THE START
REPRIORITIZEYOUR IT SECURITY TOOL SET
DISCONNECT
3
Believecompliance will prevent
data breaches
20162017
Compliance is the top priority for IT security spend of the last two years:
59%
of IT security professionals are deploying advanced technologies without the required data security
63%
57%49%
47%44%
39%31%
19%9%
SaaSIaaS
Big DataPaaS
Mobile AppsIoT
ContainersBlock Chain
Enterprise use of sensitive data within advanced technology environments
11 DISCOVER AND CLASSIFY
2
Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity
Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT
DON’T JUST CHECK OFFTHE COMPLIANCE BOX
33
ENCRYPTION AND ACCESS CONTROL4
Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments
Encryption needs to move beyond laptops and desktops
Containers: Encrypt and control access to data - within containers and underlying storage
IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats
Data center: File and application level encryption and access controls
Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS
Big Data: Encryption and access control within the environment
CLICK TO DOWNLOAD REPORT
FOLLOW US ON:
Most vulnerable95%
45%Very or Extremely
GERMANY
THE BIGDISCONNECT
2017 DATA THREAT LANDSCAPE
“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”
—Garrett Bekker, 451 Principal Analyst, Information Security
BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING
56%Endpoint
and mobile
62%Network
52%Analysis and
correlation tools
46%Data at rest
51%Data in motion
GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS
WHAT TO DO ABOUT IT
BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED
DISCONNECT
Had a data breach: Increasing IT Security spending to protect data:
Vulnerable
68%61%
88%
2016 2017
In the last year:
26%21%2016 2017
30% Very or Extremely Vulnerable
2015 2016 2017
73%
54% 58.5%
46%44%
Vulnerable90%
29%Very or Extremely
UNITED STATES
Least vulnerable77%
19%Very or Extremely
BRAZIL
1
DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY
DISCONNECT
2
BUILD IN DATA SECURITY FROM THE START
REPRIORITIZEYOUR IT SECURITY TOOL SET
DISCONNECT
3
Believecompliance will prevent
data breaches
20162017
Compliance is the top priority for IT security spend of the last two years:
59%
of IT security professionals are deploying advanced technologies without the required data security
63%
57%49%
47%44%
39%31%
19%9%
SaaSIaaS
Big DataPaaS
Mobile AppsIoT
ContainersBlock Chain
Enterprise use of sensitive data within advanced technology environments
11 DISCOVER AND CLASSIFY
2
Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity
Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT
DON’T JUST CHECK OFFTHE COMPLIANCE BOX
33
ENCRYPTION AND ACCESS CONTROL4
Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments
Encryption needs to move beyond laptops and desktops
Containers: Encrypt and control access to data - within containers and underlying storage
IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats
Data center: File and application level encryption and access controls
Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS
Big Data: Encryption and access control within the environment
CLICK TO DOWNLOAD REPORT
FOLLOW US ON:
Most vulnerable95%
45%Very or Extremely
GERMANY
Almost half (44 percent) of respondents
list meeting compliance requirementsas
their top spending priority, followed by
best practices (38 percent) and protect-
ing reputation/ brand (36 percent). Fifty-
nine percent also believe compliance is
‘very’ or ‘extremely’ effective at pre-
venting data breaches. While compli-
ance regulations provide a data security
blueprint, they are by no means the only
consideration when building a security
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com51
feature
strategy robust enough to withstand to-
day’s sophisticated attackers.
External and internal cyberactorsthetopthreat
As in years past, the 2017 Data
Threat Report explored threat per-
ceptions. All vertical industries polled
identified cyber criminals as the top
threat (44 percent), followed by hack-
tivists (17 percent), cyberterrorists (15
percent) and nation-states (12 percent).
With respect to internal threats, 58 per-
cent of respondents believe privileged
users are the most dangerous insiders (a
slight decrease from last year’s 63 per-
cent). At 44 percent, executive manage-
ment is seen as the second-most-risky
insider, followed by ordinary employ-
ees (36 percent) and contractors (33
percent).
Securing data from future threats: Promiseorperil?
In this age of the cloud and SaaS en-
terprise deployments, more and more
enterprise data is being created, trans-
ported, processed and stored outside
corporate network boundaries, making
traditional perimeter-based security con-
trols and legacy network and endpoint
protection solutions increasingly less
relevant. Other new, popular technolo-
gies also bring added security challeng-
es. For example, nearly 40 percent of
respondents are using Docker containers
for production applications. At the same
time, 47 percent cite security as the ‘top
barrier’ to broader Docker container
adoption.
Peter Galvin, Vice President of
Strategy, Thales e-Security says, “En-
terprises today must inevitably confront
an increasingly complicated threat land-
scape.Our world, which now includes
the cloud, big data, the IoT and Docker,
calls for robust IT security strategies
that protect data in all its forms, at rest,
in motion and in use. Businesses need
to invest in privacy-by-design defense
mechanisms – such as encryption – to
protect valuable data and intellectual
property and view security as a business
enabler that facilitates digital initiatives
and builds trust between partners and
customers.”
To offset the data breach trend and
take advantage of new technologies and
innovations, organizations should, at a
minimum, adhere to the following prac-
tices:
● Leverage encryption and access con-
trols as a primary defense for data
and consider an ‘encrypt everything’
strategy.
● Select data security platform offer-
ings that address a variety of use
cases and emphasize ease-of-use.
● Implement security analytics and
multi-factor authentication solutions
to help identify threatening patterns
of data use.
Source/ methodology
The data in this study is based on
Web and phone interviews of 1,105
senior executives in Australia, Brazil,
Germany, Japan, the UK and the US.
Most have a major influence on or are
the sole decision maker for IT at their
respective companies.
Respondents represented the follow-
ing industries: automotive; education;
energy; engineering; federal govern-
ment; healthcare; IT; retail; and tele-
communications.
THE BIGDISCONNECT
2017 DATA THREAT LANDSCAPE
“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”
—Garrett Bekker, 451 Principal Analyst, Information Security
BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING
56%Endpoint
and mobile
62%Network
52%Analysis and
correlation tools
46%Data at rest
51%Data in motion
GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS
WHAT TO DO ABOUT IT
BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED
DISCONNECT
Had a data breach: Increasing IT Security spending to protect data:
Vulnerable
68%61%
88%
2016 2017
In the last year:
26%21%2016 2017
30% Very or Extremely Vulnerable
2015 2016 2017
73%
54% 58.5%
46%44%
Vulnerable90%
29%Very or Extremely
UNITED STATES
Least vulnerable77%
19%Very or Extremely
BRAZIL
1
DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY
DISCONNECT
2
BUILD IN DATA SECURITY FROM THE START
REPRIORITIZEYOUR IT SECURITY TOOL SET
DISCONNECT
3
Believecompliance will prevent
data breaches
20162017
Compliance is the top priority for IT security spend of the last two years:
59%
of IT security professionals are deploying advanced technologies without the required data security
63%
57%49%
47%44%
39%31%
19%9%
SaaSIaaS
Big DataPaaS
Mobile AppsIoT
ContainersBlock Chain
Enterprise use of sensitive data within advanced technology environments
11 DISCOVER AND CLASSIFY
2
Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity
Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT
DON’T JUST CHECK OFFTHE COMPLIANCE BOX
33
ENCRYPTION AND ACCESS CONTROL4
Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments
Encryption needs to move beyond laptops and desktops
Containers: Encrypt and control access to data - within containers and underlying storage
IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats
Data center: File and application level encryption and access controls
Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS
Big Data: Encryption and access control within the environment
CLICK TO DOWNLOAD REPORT
FOLLOW US ON:
Most vulnerable95%
45%Very or Extremely
GERMANY
THE BIGDISCONNECT
2017 DATA THREAT LANDSCAPE
“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”
—Garrett Bekker, 451 Principal Analyst, Information Security
“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”
—Garrett Bekker, 451 Principal Analyst, Information Security
BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING
56%Endpoint
and mobile
62%Network
52%Analysis and
correlation tools
46%Data at rest
51%Data in motion
GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS
WHAT TO DO ABOUT IT
BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED
DISCONNECT
Had a data breach: Increasing IT Security spending to protect data:
Vulnerable
68%61%
88%
2016 2017
In the last year:
26%21%2016 2017
30% Very or Extremely Vulnerable
2015 2016 2017
73%
54% 58.5%
46%44%
Vulnerable90%
29%Very or Extremely
UNITED STATES
Least vulnerable77%
19%Very or Extremely
BRAZIL
1
DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY
DISCONNECT
2
BUILD IN DATA SECURITY FROM THE START
REPRIORITIZEYOUR IT SECURITY TOOL SET
DISCONNECT
3
Believecompliance will prevent
data breaches
20162017
Compliance is the top priority for IT security spend of the last two years:
59%
of IT security professionals are deploying advanced technologies without the required data security
63%
57%49%
47%44%
39%31%
19%9%
SaaSIaaS
Big DataPaaS
Mobile AppsIoT
ContainersBlock Chain
Enterprise use of sensitive data within advanced technology environments
11 DISCOVER AND CLASSIFY
2
Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity
Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT
DON’T JUST CHECK OFFTHE COMPLIANCE BOX
33
ENCRYPTION AND ACCESS CONTROL4
Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments
Encryption needs to move beyond laptops and desktops
Containers: Encrypt and control access to data - within containers and underlying storage
IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats
Data center: File and application level encryption and access controls
Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS
Big Data: Encryption and access control within the environment
CLICK TO DOWNLOAD REPORT
FOLLOW US ON:
Most vulnerable95%
45%Very or Extremely
GERMANY
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com52
product showcase
Arecont Vision megapixel cameras
are cybersecurity-hardened. Hack-
ers are increasingly using surveillance
cameras as their point of attack, used to
break into, corrupt, or disrupt surveil-
lance systems, computer networks, and
the Internet. Cybersecurity is now more
important than ever.
Many IP surveillance cameras have
relied on network security to protect
them from abuse, or offered no security
at all. That is changing as cybersecu-
rity attacks become more sophisticated.
Manufacturers need to balance the user
experience with security, and no product
should be connected to the network un-
less it offers 16 character ASCII pass-
words and the ability to receive feature
and security updates after installa-
tion.
A more challenging issue is cy-
ber-hardening of surveillance cam-
eras. Most cameras run common op-
erating systems (OS), such as Linux.
This lets the manufacturer add third
party code and add-on chips for new
features, rather than developing eve-
rything on their own, for both cost
savings and time-to-market reasons.
Unfortunately, this opens the cam-
era to cyberattack through potential
buried malware and in providing OS
entry points to attackers.
Verisign, a US-based network infra-
structure and security company, reports
that the frequency of cyberattacks is
increasing by 75% year-over-year (see
https://goo.gl/tHVZKR).
Tens of thousands of cameras,
NVRs, and Internet-of-Things (IoT)
enabled-devices have been misused
in well-publicized Distributed Denial
of Service (DDoS) attacks. DDoS at-
tacks turn devices into robotic attackers
or ‘bots.’ A September 2016 attack on
Krebsecurity.com and French hosting
firm OHV involved over 140,000 hi-
jacked network cameras and DVRs (see
https://goo.gl/Df4Mkr).
The next month, a major DDoS at-
tack on network monitoring and DNS
routing company Dyn impacted up to
85 web services, slowing or cutting off
access to Amazon, the Financial Times,
Netflix, PayPal, Reddit, Spotify, Twit-
ter, and other sites with an estimated
$100M loss in revenue (see https://goo.
gl/mtyrp8).
On January 31, 2017, the Security
Industry Association Update e-newslet-
ter reported that the police department in
Washington, DC, lost control of 123 of
Arecont Vision’s Cyber-Hardened Cameras
“Arecont Vision megapixel cameras are immune to be-ing used in cyberattacks. All of the cameras’ core functions are developed for use on Arecont Vision’s Massively Par-allel Image Processing Architecture, eliminating the risk of undetected malicious code from a 3rd party. Every camera runs on custom-designed Field Programmable Gate Array (FPGA) integrated circuits that allow the cameras to be updated with the latest security updates plus new features
can be added even after installation.” – Jeff Whitney
VP Marketing, Arecont Vision
product showcase
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com53
product showcase
187 NVRs to a ransomware cyberattack.
A city police department outside of
Dallas, Texas was also reported to have
suffered lost video after a similar inci-
dent. Ransomware encrypts the data on
computer systems, and charges a ransom
to have the encryption removed. It was
not revealed if the cameras were used to
propagate these two cyberattacks, or if it
was by other means.
Should a hacker obtain an ID and
password for an Arecont Vision camera,
they are only able access that individual
device. They would be unable to repur-
pose it maliciously, unlike other network
surveillance cameras that have been
proven susceptible in previous cyberat-
tacks time and again.
To protect networks and devices,
Arecont Vision is the proven cyber-hard-
ened camera choice.
Providing a safe camera solution
for video surveillance applica-
tions within hazardous areas, Hikvi-
sion, the world’s leading supplier in
innovative video surveillance prod-
ucts and solutions, has launched
three new ATEX & IECEx certified
standard network cameras, including
bullet and PTZ dome style models.
Explosionresistance
Continuing their goal to develop
and launch surveillance prod-
ucts that fulfil customers’ special
applications needs, Hikvision’s latest
explosion-proof cameras utilize 304
and 316L stainless steel housings for
maximum corrosion and explosion
resistance, and are IP68 water/ dust
ingress rated. For any surveillance
requirement within hazardous envi-
ronments, or environments where the
camera is required to operate within
areas with combustible sources, the
new explosion proof cameras provide
a high-performance and safe imaging
solution. Typical applications are for
potentially hazardous or explosion
risk areas, such as gas & oil pro-
HIKVISION launch High-performance explosion-proof camera range
cessing and storage plants, chemical
plants, industrial sites, deep mines,
or marine applications.
DarkFighter technology
Hikvision’s range of industry-
leading ultra-low-light explo-
sion-proof camera models boast
Hikvision DarkFighter technology,
providing minimum illumination as
low as to 0.005Lux in colour mode
and 0.0005Lux in B/W mode. The
result is crystal-clear colour and
monochrome images in conditions
that would defeat conventional low-
light models. The range also comes
with progressive scan 2MP and
4MP CMOS image sensors, full HD
1080p video at up to 60fps, triple
video streams, 3D DNR and 120dB
WDR.
H.265+Smartcodec
Greatly reducing the required vid-
eo bitrate to reduce bandwidth
and associated storage costs, the new
cameras support the latest Hikvision
H.265+ smart codec technology. An
intelligent algorithm developed by
Hikvision, H.265+ is a remarkable
encoding technology based on the
H.265/ HEVC (High Efficiency Vid-
eo Coding) standard, with the benefit
of being able to greatly decrease the
bitrate of surveillance video through
three core technologies, namely: Pre-
diction Encoding, Noise Suppression
and Bitrate Control.
Accepting 100V-240V AC and
PoE input power, video performance
is enhanced via Smart features such
as Smart Detection, Smart Tracking
and ANPR; the new explosion-proof
camera range delivers a robust video
surveillance camera solution for use
within any harsh/ critical operational
environment. The cameras also sup-
port on-board storage up to 128Gb
via SD card.
Hikvision explosion-proof cam-
eras include the DS-2XE6222F-
IS 2MP Explosion-Proof Network
Bullet Camera, DS-2XE6242F-IS
4MP Explosion-Proof Network Bul-
let Camera and DS-2DF6223-CX
(W) 2MP Explosion-Proof Network
Speed Dome.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com54
product showcase
Sony introduces the all-new RM-
IP500 remote controller that gives
operators easier and more intuitive con-
trol of its latest pan-tilt-zoom (PTZ)
cameras, for a range of applications in-
cluding event production, broadcast and
lecture capture for education.
The RM-IP500 controller is de-
signed to work with Sony’s latest BRC-
X1000, BRC-H900, BRC-H800, and
SRG-360SHE PTZ cameras as well
as the new MCX-500 all-in-one High
Definition (HD) switcher, supporting
SD card recording and IP streaming to
create an easy-to-use event production
system.
“Sony’s all-new RM-IP500 remote
controller is equipped with flexible zoom
patterns, speed control options, presets
and firmware upgrades to offer future
sony’s rM-ip500 remote controller delivers greater flexibility and easier operation of ptZ
cameras for lecture capture and event production
support and new capabilities,” said Riki
Nishimura, General Manager, Business
& Industrial Solutions Marketing Divi-
sion, Professional Solutions Company
(PSAP), Sony Electronics Asia Pacific,
“Furnished with features that are neces-
sary in boosting efficiency, the new con-
troller allows users to single-handedly
select and professionally control each
shot across multiple BRC cameras in
challenging environments.”
GreaterflexibilityandeasieroperationofPTZcameras
The RM-IP500 features single-hand-
ed PTZ joystick operation and can
be customized according to user’s pref-
erence. With selectable zoom control
functions, it provides the option of see-
saw (left hand) or joystick (right hand)
operation. Further, the PTZ speed can
be easily adjusted with the controller’s
knob, and direct buttons are available
for frequently used functions e.g., PTZ
trace memory and preset – at the push
of a button.
Easysetupforlarge scale system installations as well as live event system
Allowing fast set up and streamlines
operations, the new controller sim-
plifies IP assignment for up to 100 cam-
eras using the AUTO IP setting. The user
can program up to 100 preset camera an-
gles for precise, easy manoeuvring. With
a newly designed body, the compact
controller measures 306mm x 159.3mm
x 224.1mm, or 12 1/8” x 6 3/8” x 8 7/8”
(without projection) and can be mounted
on or in any console.
The RM-IP500 offers a host of control
signal formats and control options includ-
ing RS-422 and VISCA over IP as well as:
● VISCA RS-422: RJ-45x 1.
● LAN: RJ-45x 1, 10BASE-T/100BASE-
TX automatically detected.
● GPI I/O (Tally in/ contact out): D-
sub 15-pin type.
The RM-IP500 remote controller is
planned to be available in Asia Pacific
from June 2017 onwards.
cost-effective system configuration possible with single-operator control of up to 100 cameras, memory recall, and PtZ speed adjustments
product showcase
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com55
product showcase
UniqueWiseStreamtechnology
Completing the long list of innovative
features built into the PNM-9020V
is WiseStream, a complementary com-
pression technology which dynamically
controls encoding, balancing quality and
compression according to movement in the
image. Bandwidth efficiency is improved
by up to 75% compared to current H.264
technology when WiseStream is combined
with H.265 compression. This ensures that
Hanwha Techwin Europe’s new Wisenet P
series is one of the most bandwidth friend-
ly camera ranges available.
Designed for monitoring large open
areas with just one camera, the
PNM-9020V is equipped with multi-
sensors which enable it to capture superb
quality seamlessly stitched 180° images.
Four 2MP images with 3.6mm lenses
work in harmony to produce the 180°
composite images. This is achieved with
the help of a synchronised alignment le-
ver located in the centre of the camera
which raises and lowers the sensors in
unison to facilitate easy set up.
“The PNM-9020V’s high definition
and panoramic capabilities means end-
users can achieve an exceptionally high re-
turn on investment (ROI), as it can perform
the work of three or four standard HD cam-
eras and so deliver significant savings on
camera purchasing and installation costs,”
said Tim Biddulph, Head of Product Man-
agement for Hanwha Techwin Europe.
Key features
In addition to being equipped with
digital PTZ, the PNM-9020V, which
new samsung wisenet p series panoramic 180° camera with unique
H.265 & Wisestream CompressionHanwha techwin has further broadened its samsung Wisenet P series
with the introduction of a 7.3 megapixel 180° panoramic camera
surveon Boosts surveillance performance with High throughput and long recording dayWith the prevalence of surveil-
lance cameras installed for se-
curity concerns, it’s quite common to
see hundreds or thousands of cameras
in one single project site. To ensure the
surveillance work is carried out without
is IP66 and IK10 rated for vandal-re-
sistance and outdoor use in the harshest
environments, shares many of the inno-
vative, practical features with the four
other models in the Wisenet P series.
These include Digital Auto Tracking,
True Wide Dynamic Range, and Lens
Distortion Correction to deliver opti-
mised images in every situation. Also
provided is bi-directional audio support,
privacy masking, a 12V DC, PoE capa-
bility and an SD card slot to ensure that
video is automatically recorded in the
event of network disruption.
Openplatform
Video analytics such as heat map,
virtual line, enter/ exit and ap-
pear/ disappear are provided as stand-
ard, whilst the power of the open
platform DSP chipset built into PNM-
9020V provides end-users with the
flexibility to run edge-based video ana-
lytics which matches their individual
requirements.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com56
product showcase
trouble, a reliable recording system sup-
porting multiple channels at once with
long-term recording capability would be
something to take into account when it
comes to project requirement. Surveon
offers a performance-driven solution
with high throughput and long record-
ing day, not only supporting hundreds of
channels with more than one-year non-
stop recording but also ensuring all cam-
eras can be recorded and viewed reliably,
giving partners a powerful weapon to in-
crease the chance for tender winning.
Projects like government institu-
tions, casinos, commercial buildings,
and factories are complex scenes involv-
ing people and movement every day.
Therefore, deploying security systems at
a higher level is a must for these public
places. Surveon’s performance-driven
solution offers high throughput and ex-
pandable storage to support hundreds
of channels with long-time recording.
Among Surveon NVR selection, the
Milestone VMS pre-loaded NVR7800
Series or mission critical storage
NVR7300 Series could be the options
in such applications. Different from tra-
ditional system structures composed of
recording server plus a separate storage
device, NVR7800 and NVR7300 Series
are designed as a recording server with
an archiving function, providing part-
ners more cost-effective choices. Be-
sides, the built-in SAS port connection
for JBOD expansion enclosures allows
the system to scale up to 316HDDs,
making NVR7800 and NVR7300 Series
ideal for medium-large scale projects in
need of long-time recording.
The NVR7800 Series with Mile-
stone VMS can support up to 150CH
3MP cameras recording, more than
twice Milestone’s benchmark level in
a non-stop recording scenario. The
MTP report shows that NVR7800 Se-
ries delivers a high level of recording
throughput of nearly 2000 Mbps, ensur-
ing smooth live viewing and recording.
Besides, NVR7800 Series is also fully
compatible with Genetec VMS, serving
300 CH 1.3MP cameras with continuous
recording or 190 CH 1.3MP cameras
with motion detection recording based
on the internal test result. In addition
to the Window OS in NVR7800 Series,
NVR7300 Series comes with Linux OS
plus Surveon enterprise-level VMS,
supporting up to 128CH 5MP cameras
with non-stop recording and delivering
total 768 Mbps recording throughput,
giving partners one more option to meet
requirements for potential surveillance
tenders.
Surveon performance-driven solu-
tion with high throughput and long re-
cording day has been adopted in some
vertical solutions, such as KL Tower, the
highest building in Malaysia, requiring
120-day non-stop recording on the site.
Another success case would be the air-
line catering service provider in Hong
Kong, who is also satisfied with the ful-
filment of continuous recording for 180
days.
avigilon launches Highly anticipated appearance search technology
Avigilon expands video analytics platform with the launch of advanced search technology
Avigilon Corporation has announced
that it has further enhanced its self-
learning video analytics capabilities by
introducing Avigilon Appearance Search
technology immediately available with
Avigilon Control Center (ACC) 6.0 vid-
eo management software.
Avigilon Appearance Search, Avig-
ilon’s newest and most advanced video
analytics technology, is a sophisticated
deep learning artificial intelligence (AI)
search engine that sorts through hours
of footage with ease, allowing users to
quickly locate a specific person of inter-
est across all cameras on an entire site. It
can save time and effort during critical
investigations as it intelligently analyzes
video data helping to track a person’s
route and identify previous and last-
known locations.
“Historically, video surveillance
searches were done on a single camera,
based on time, motion and activity,”
said James Henderson, Avigilon’s Chief
Sales and Marketing Officer, “But with
Avigilon Appearance Search technol-
ogy, users can now easily search for all
instances of a specific person across all
their cameras distributed throughout a
site, with the click of a button. This is
designed to make searching for a person
as easy as searching the internet.”
Avigilon Appearance Search tech-
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com57
product showcase
nology is integrated
with ACC 6.0 Enter-
prise edition software,
Avigilon cameras with
self-learning video
analytics and select
Network Video Re-
corders.
“With Avigilon
Appearance Search
technology users can
answer the critical
‘where’ and ‘what’ of video searches quickly and decisively,” said Dr. Mahesh
Saptharishi, Avigilon’s
Chief Technology Of-
ficer, “This is an ex-
citing milestone in the
development of Avig-
ilon’s comprehensive
AI and deep learning
video analytics plat-
form, as we continue
to provide customers
with full solutions for
a broad range of video
surveillance applications.”
Figure: Avigilon Appearance Search technology in ACC 6.0
Milestone releases Highest performing VMs ever
the first product update of 2017 enables record-breaking performance for XProtect users, lower hardware costs and lower total cost of ownership. cybersecurity is another focus in the new
version of the award-winning VMs
Milestone Systems has released
XProtect 2017 R1. Milestone
is committed to delivering three VMS
product releases every year, in addition
to bi-monthly device pack releases sup-
porting third-party devices. This fre-
quent release schedule will ensure Mile-
stone’s rapid response to market and
Milestone community needs.
Highest VMS performance
Thanks to the true open platform
technology in XProtect, Milestone
can rapidly respond to community needs
and enable cost-efficiency in large in-
stallations. For XProtect, this entails
a recording server performance of 3.1
Gigabit/S. This high performance level
Pioneeringhardwareacceleration
In the latest XProtect releases, Mile-
stone has harvested the advantages
of the close relationships with Intel and
Microsoft by implementing hardware
acceleration. The processor-intensive
enables Milestone community partners
to offer large solutions using a reduced
number of servers, or even smaller serv-
ers. This contributes to hardware costs
savings and a simplified infrastructure.
In short, it significantly reduces the total
cost of a Milestone solution.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com58
product showcase
task of decoding (rendering) video is
offloaded to the dedicated graphics sys-
tem (GPU) inside the processer, leaving
the main processor free to take on other
tasks. The GPU is optimized to handle
computer graphics and video, meaning
these tasks will be greatly accelerated.
Using the technology in servers can save
even more expensive computer muscle.
Hardware-accelerated video motion
detection is new in XProtect 2017 R1 -
another industry first for VMS software.
Customers can have twice as many cam-
eras on the same server with the same
CPU load, or experience up to 90 per-
cent reduction in the CPU load with the
same number of cameras on the server.
This use of hardware acceleration lets
mid- to large-scale installations experi-
ence improved performance at a lower
hardware cost.
Hardware acceleration was already
implemented in the XProtect 2016 Smart
Client. This provided an 80 percent re-
duction in the processor load on comput-
ers with selected Intel processors, firm-
ware, drivers and Microsoft operating
systems. This paves the way for the use
of 4K cameras and processing-intensive
video compressions like H.265.
New cybersecurity features
As video management systems are
becoming more and more busi-
ness-critical, cybersecurity is a natural
focus. In 2016, Milestone launched sev-
eral initiatives aimed at strengthening
security in Milestone software. Like the
Hardening Guide that details how an
XProtect installation can be better se-
cured against cyber threats and the Ker-
beros strict user-verification in XProtect.
The XProtect 2017 R1 update in-
cludes several security enhancements
for improved cybersecurity, including
two-step verification and greater control
when granting user permissions for the
Milestone Advanced VMS products.
Two-step verification is an industry-
first security feature for XProtect 2017
R1. It is designed to prevent unauthor-
ized access to the VMS when a password
is compromised, as a code from the us-
er’s mobile phone is needed to complete
login.
Keeping VMS systems isolated from
the Internet is one important element
when it comes to keeping a high security
level. XProtect Smart Maps (introduced
last year) now include support for Open-
StreetMap offline maps: This means that
customers with offline installations can
take advantage of improved situational
awareness by using maps, without ex-
posing their XProtect system to online
threats.
XProtect 2017 R1 is available to the
Milestone community now.
Security integrators looking to grow
their ever-important recurring
monthly revenue (RMR) can capitalize
on a new proactive and profitable ser-
vice offering by adding Viakoo’s unique
Automated Data Verification Solution.
Viakoo’s award-winning and patented
solution – which is field proven at nu-
merous organizations with over 100 mil-
lion hours of surveillance supported –
improves integrators’ service efficiency
by up to 40 percent.
“Viakoo’s Data Verification Solu-
tion provides security integrators with
an easy way to generate a new source
of RMR, while improving their ability
to ensure the integrity and reliability
of their customers’ systems,” said Bud
Broomhead, Chief Executive Officer,
Viakoo, “Security integrators are being
driven by the market to upgrade from re-
active service to proactive service, and
our solution enables them to fully capi-
talize on this trend.”
Viakoo runs advanced system analyt-
ics to provide early problem detection,
scientific diagnosis, and recommended
courses of action to ensure that surveil-
lance and access control system opera-
tions are fully documented and in contin-
uous compliance. The Viakoo multi-client
platform can be accessed remotely by
authorized personnel from their smart-
phone or PC. Combined with Viakoo’s
experienced technical support team, Via-
koo subscribers have all the resources
they need to effectively detect, diagnose
and solve surveillance and access control
system issues from anywhere 24/7.
Viakoo’s automated surveillance and access data Verification Solution Delivers RMR for Integrators
Proactive service boosts integrators’ bottom line while ensuring maximum efficiency
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com59
product showcase
3xLOGIC, Inc. has announced con-
tinued solid uptake of its VIGIL
Central Management (VCM) software,
amid excellent feedback on the deploy-
ment of VCM in the field.
VCM provides security profession-
als with the tools they need to effectively
manage and monitor multiple 3xLOGIC
VIGIL Servers and VISIX cameras over
IP networks. With VCM, users are noti-
fied immediately if there is an issue with
a server or camera connected to their
network. This allows potential problems
to be resolved proactively before a loss
of critical video or service occurs.
BatesSecurityfindsRMR success
Jeremy and Bryan Bates, owners of
Bates Security (and Sonitrol of Lex-
ington, KY and Jacksonville, FL), are
among the most successful to date in im-
plementing VCM as a managed service
offering for their customers. “We don’t
sell systems unless there is a full-service
maintenance contract,” explained Jer-
emy Bates, “With 3xLOGIC’s VCM as
part of that system, we offer a whole new
level of service, a true managed service.
Now, we know when a camera is down
before the end user does. Unlike in the
past, when you found out a camera was
malfunctioning because you had no
video of that recent incident you really
needed to see.”
Bates Security has 176 3xLOGIC
video surveillance systems and count-
ing that are utilizing the VCM managed
service offering. “VCM as part of our
managed services significantly strength-
ens our value proposition,” said Bryan
Bates, “Our video systems also include
a monthly investment. This monthly in-
vestment provides real value to the cli-
ent because of the work Bates Security
does every day to deliver the best pos-
sible video solution. Clients can rest
assured that their cameras and video
servers are functioning and that they
will deliver video when it matters most.
The monthly investment also covers the
equipment, should it have problems, and
even replaces a camera with the latest,
best model if it can’t be repaired.
VCMfacilitatesdeepercustomerrelationships
VCM as part of a managed ser-
vices agreement sounds great in
theory, but the Bates have repeatedly
seen it in action. One customer had ac-
cidently turned off a camera that pro-
vided views of a parking area. VCM
sent an alert, and a Bates Security
administrator contacted the end user
to get the camera back online. Within
a day or two, the video surveillance
system caught two perpetrators throw-
ing a brick through a car window in
the parking area and making off with
3xlogic Vigil central Management software creates solid rMr for integrators
Integrator partners report growing results for VcM in exceeding end user needs
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com60
product showcase
a purse. The video images were quite
clear, and the police were able to ap-
prehend the suspects based on the
video evidence. Without this level of
technology and service, it’s likely the
camera would have remained down
and the incident left unrecorded.
“If that end user had bought his sys-
tem off the internet or from an integrator
not providing full service, he’s probably
got nothing,” said Jeremy Bates, “Be-
cause he didn’t invest in a total solu-
tion.” Bryan Bates added, “VCM gives
us many opportunities to ‘touch’ the cli-
ent, to provide consistent value, to have
a conversation and stay current with
their needs and mindset. It’s a very valu-
able tool for us.”
The 3xLOGIC VIGIL Central Man-
agement software’s main end user ben-
efits include:
● VIGIL server, NVRs and VISIX
camera health monitoring.
● E-mail/ text alerts of health moni-
toring events (number of recording
cameras, hard drive storage, proces-
sor utilization).
● User account and permissions man-
agement.
● Remotely deployable VIGIL Soft-
ware Suite updates.
● Back-up and storage for server con-
figuration files.
Proxim Wireless Corporation, a
pioneer and global leader in point
to point (PtP) and point to multipoint
(PtMP) wireless systems and advanced
Wi-Fi, introduces the Tsunami MP-
10150-CPE and MP-10100-CPA. This
small, high capacity subscriber unit is
ideal for installations where space is
limited such as busses or metros, but
performance is a must. Combined with
Proxim’s Fast Connect, this new release
brings 200Mbps to mobile off load ap-
plications.
The Tsunami 10100 CPE and CPA
support all the advanced features of the
larger and more powerful 10100 series
Base Station Units and Subscriber Units
with features such as a high speed pro-
cessor for improved packet performance,
support for Jumbo Frames, pass through
on 1588V2 timing protocol, high power
output and a ruggedized IP67 enclosure.
The CPE and CPA are offered with a
proxim wireless introduces the tsunami® 10100 cpe and cpa
small form factor, high performance client device
wide range of throughput: 50, 100, 150
and 200Mbps. Moreover, each model
can be license upgraded to higher capaci-
ties as network demands grow over time.
All of this advanced functionality and
high speed throughput is contained in
a small, robust and compact size of less
than 5x8.62x2.58 in (126x219x65.5mm)
making it one of the smallest 200Mbps
devices on the market.
The CPE version comes with an in-
tegrated 16dBi antenna, while the CPA
supports two surge protected N-Type
connectors for any dual polarity exter-
nal antenna. Having an external antenna
makes it easier for integrators to posi-
tion this unit in mobile platforms such as
buses or metro rail platforms where the
equipment space is often times limited to
a small cabinet. This facilitates mount-
ing the antenna on the roof with the unit
down below, and it also allows deploy-
ment with specifically designed mobile
antennas. Furthermore with support for
12V powering, the Tsunami 10150 CPE
and 10100 CPA can be deployed in cars
or powered by wind or solar.
In keeping with Proxim’s commit-
ment of at least two generations back-
wards compatibility, Tsunami 10100
CPE and CPA are interoperable with
Tsunami 8200 platform as well as the
Tsunami 800 series product line.
“The Tsunami MP-10150-CPE and
MP-10100-CPA continue Proxim’s lead-
ership in offering more performance for
the money, and with this product release
does so in a small form factor that opens
up numerous additional applications,”
said Greg Marzullo, CEO and President,
Proxim Wireless, “The 10150 CPE is
a lead product in several planned ad-
vanced IOT 3.0 solutions which will be
launched this year enabling us to better
support intelligent transport applica-
tions.”
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com61
product showcase
needed.
QNAP recommends high-perfor-
mance Enterprise NAS models for pro-
viding OpenStack storage. This range
includes the Enterprise ZFS NAS that
features dual active-active controllers and
the QES operating system that supports
high-availability, near-limitless snap-
shots, data de-duplication, and compres-
sion. Other recommended NAS include
the TES-1885U and TES-3085U. Pow-
ered by Intel® Xeon® D processors, they
are capable of running either the QTS or
QES operating system on a single rack-
mount NAS and acting as an ideal backup
NAS for Enterprise ZFS NAS.
OpenStack Ocata has a projected re-
lease date of February 22, 2017.
security and added convenience Featured in Upgraded KeyWatcher®
touch system at ice totally gaming 2017system more attractive to technology-based gaming entities
QNAP® Systems, Inc. has an-
nounced that the QNAP Cinder
Driver has been verified by OpenStack®
to support the upcoming ‘Ocata’ ver-
sion. Businesses can easily configure
QNAP NAS as block storage supporting
their OpenStack environment to build a
cost-effective hybrid cloud solution.
“The support for the OpenStack
Cinder Driver enables QNAP's enter-
prise-grade NAS to be an integral part
of OpenStack ecosystems, providing
businesses with a flexible, easy-to-use,
and low-cost storage solution,” said Wa-
terball Liu, Product Manager of QNAP.
With the QNAP Cinder Driver users
can easily implement QNAP NAS for
OpenStack to attain highly-available and
secure storage for on-site data, as well as
to protect virtual machine data by using
snapshots for data recovery whenever
Qnap cinder driver supports openstack ocata, providing Block storage and snapshots
Morse Watchmans, the industry
leader in key control and asset
management systems, brought out-of-
the-box solutions to ICE Totally Gaming
2017 with its recently enhanced Key-
Watcher® Touch. New features present-
ed at their booth included security and
notification upgrades, plus ease-of-use
improvements that make the key man-
agement system even more flexible and
useful in fulfilling the safety and secu-
rity needs of resorts and casinos.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com62
product showcase
“Visitors to this
show understand
the need for an in-
creased degree of
component security
to ensure system in-
tegrity,” said Fernan-
do Pires, VP of Sales
and Marketing,
Morse Watchmans, “We have bolstered
the security features of our KeyWatcher
Touch to meet these demands, allowing
users to be confident in implementing
the system throughout the enterprise.”
Multiple new security features pro-
tect the system from cyber breaches via
the network. With the firewall enabled,
all incoming traffic is ignored unless it is
on the specific ports the system requires
for network and server communication.
The data between the KeyWatcher Touch
and the KeyWatcher Touch Server can
now be encrypted with AES256 technol-
ogy via a pre-shared key that is definable
on a site-by-site basis.
For further operational convenience,
a number of additional upgrades have
been implemented. KeyWatcher Touch
Server service can now run under a do-
main user account. Windows authentica-
tion is supported for SQL, while server
logins eliminate the need for the IT de-
partment to add SQL users to the SQL
server for the purpose of authentication.
The KeyPro™ III software import utility
has been revamped to make it easier to
use; for example, imports can now be
performed as needed so that the user does
not have to complete them all up front.
According to Pires, day-to-day user
conveniences have been upgraded in-
cluding the ability to replace keys from
TrueTouch™ key tracking software using
the SmartKey reader. A new notification
that allows for users to be notified when
an overdue key has been returned is also
included, as well as notifications for dual
and triple user removals/ returns. All re-
ports in TrueTouch now support being
saved/ viewed as a PDF, or saved as a
CSV file.
“With these updates, KeyWatcher
Touch makes key control more attractive
to the casino, bingo and resort sectors of
the gaming industry,” said Pires, “It adds
to the ways users can benefit from a key
management system investment.”
Barco further optimizes the Visual experience of super-narrow Bezel tiled lcd Video walls
Barco’s family of narrow-bezel LCD
video walls couple the traditional
advantages of tiled LCD video walls –
excellent image quality, minimum space
requirement, and an advantageous price
setting – with innovations to ensure
availability and optimize TCO. The new
OverView HVD5521 now joins this
portfolio, with a screen diagonal of 55”
and a brightness of 700 cd/m². Its ex-
tremely narrow total bezel width of only
1.8 mm (measured between screens)
enhances the visual consistency of the
video wall, making it better suited for
content that spans multiple displays.
Tailored for use in critical environments
Because control rooms are highly
critical environments, uptime of all
components needs to be assured. This
means that not only must component
failure be avoided, but also that mainte-
nance time must be kept to a minimum.
To counter the classic problem with
color and brightness level shifts in LCD
video walls, Barco developed the unique
Sense X automatic color and brightness
calibration system based on integrated
color sensors. This technology automati-
cally balances the video wall at all times,
eliminating the need for expensive and
time-consuming manual calibration.
This not only optimizes uptime, but also
contributes to the wall’s low TCO.
Furthermore, the optional redun-
Barco announces a new product in its super-narrow bezel LcD video wall portfolio. the OverView HVD5521 is Barco’s most advanced tiled LcD video wall to date, offering operators a stunning
visual experience. Designed for use in control rooms, the HVD features some unique innovations that boost reliability, lower total cost of Ownership (tcO), and minimize maintenance needs
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com63
product showcase
dant external power supply automati-
cally switches to a new unit if one
should fail, eliminating downtime due
to power supply failure. And because
the power supply is located remotely,
its maintenance can be performed
without disturbing operations. Plus,
any staff member (not only certified
technicians) can replace a defective
power supply unit − so this system also
reduces labor cost.
Near-seamless, great colors, high brightness and reliability
“The trend in the LCD
video wall market
is toward the narrowest
bezel possible,” says Pietro Capret-
ta, Product Manager at Barco, “And
the OverView HVD accelerates this
trend. We are very proud of this prod-
uct, which demonstrates our
continued commitment and
investment in the tiled LCD
video wall market. In ad-
dition to the near-seamless
canvas, the great colors and
high brightness and reliabil-
ity make this display stand out. It’s the
perfect addition to our LCD video wall
portfolio – and will further expand our
footprint in this market.”
Ramp Up the Security and Efficiency of industrial networks with the oncell g3150a-lteWireless connections bring conven-
ience to industrial networks, but
they also increase security risks, espe-
cially during data transmissions. Moxa’s
new LTE cellular gateway, the OnCell
G3150A-LTE, enables high-speed data
transmission without compromising net-
work security. The OnCell Central Man-
ager tool extends the capabilities of the
cellular gateway to provide fast deploy-
ment as well as powerful monitoring and
security functions.
In line with the products of the On-
Cell series, this LTE cellular gateway is
designed for rugged operating environ-
ments, including remote locations. Dual
SIMs together with the GuaranLink
function, which automatically re-reg-
isters the device with a base station to
establish a new cellular connection when
the signal goes down, ensure connection
continuity. The built-in power isolation
and dual power inputs protect the device
against EMC and ensure reliable con-
nectivity. The LTE gateway can operate
reliably at extreme temperatures, which
makes it ideal for outdoor deployments.
Enhanced security to reduce data transmission risks
To prevent cyber attacks on your net-
work and block unauthorized access
of critical data over the cellular network,
Moxa’s new LTE cellular gateway pro-
vides secure VPN communication capa-
bilities in both master and client modes.
Support for site-to-site security protocols,
such as OpenVPN, GRE, and IPSec, help
you easily establish secure connections be-
tween two networks. In addition, the gate-
way complies with the technical require-
ments of the IEC 62443-4-2 cybersecurity
standard to provide enhanced security.
Designedforefficiencyin long-distance applications
A cellular network is a perfect solu-
tion for device connectivity in hard-
to-reach areas where wiring is expensive
or complicated. However, managing re-
mote industrial devices continues to be
a challenge for most operators. Moxa’s
OnCell Central Manager tool, available
at no cost with the OnCell cellular gate-
way, facilitates fast deployment through
mass configuration of a large number
of cellular devices, and remote device
maintenance. Network operators can
use this tool to remote-
ly upgrade firmware
on devices and rec-
tify faulty devices by
sending SMS control
commands to remotely
reboot the gateways.
The cellular gateway
provides built-in inter-
faces for both Ethernet and
serial connections, which is convenient
for implementing converged networks ef-
ficiently and with ease.
OnCell G3150A-LTE highlights● VPN secure connection capabil-
ity with IPSec, GRE, and OpenVPN
protocols.
● 3-in-1 serial port for serial data trans-
mission over LTE cellular networks
to enable easy data acquisition.
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com64
product showcase
KX-HNC800 side KX-HNC800 front KX-HNC800 front shutter
● Free OnCell Central Manager tool
for quick deployment and remote
management of devices.
● Dual SIMs for cellular operations
backup coupled with Moxa’s Guar-
anLink technology enables cellular-
link redundancy.
● Power isolation design for better de-
vice protection against harmful elec-
trical interference.
● Industrial-grade design with dual-
power inputs and built-in DI/ DO.
Panasonic has announced the new
KX-HNC800EW, a Full HD indoor
camera that protects your privacy. Fea-
turing a pre-record function, you can
now capture more footage than other
home cameras, and by using its manu-
ally sliding shutter, avoid recording all
those private family moments.
Record everything you want to – nothing you
don’t
Through its manually
sliding shutter, the
new HD indoor camera al-
lows users to control when
the camera records. This
means that owners can
quickly and easily cover
the camera and micro-
phone to suit any occasion
they may not want to re-
cord, such as when enter-
taining guests.
Nevermissimportantfootage
For comprehensive, accurate video
recording, the KX-HNC800EW
includes a pre-record function. Image
processing begins two seconds before
the camera’s sensor activates the record-
ing process, capturing even more im-
portant footage
than ordinary
home cameras.
A perfect solu-
tion for keeping
an eye on pets
in the home,
animal owners
will never miss
a moment. It’s
now possible
to view and re-
cord all those
cute and funny
moments both
instantly and easily in Full HD. The
camera also allows for two-way com-
munication via the Panasonic app using
its optimised microphone.
Sync seamlessly with otherPanasonicSmartHome devices
The Panasonic KX-HNC800EW is
a stand-alone camera which also
syncs seamlessly to work with Pana-
sonic’s wireless hub, indoor/ outdoor
cameras, smart plugs and other sensors
and components in the Panasonic Smart
Home System.
It also offers wireless monitoring with
optional push notifications for up to eight
smart devices when motion is triggered.
Sharp,smoothrecord-ingsthatcaptureanentire room
The single Panasonic KX-HNC800EW wide angle lens provides full-room
coverage with its 142-degree diagonal wide-angle view. Exceptional Full HD video is recorded, even in low light, with a fast-focusing lens for sharper image ad-justment to capture smooth, movie-quality videos at 30 frames per second.
Full HD (1080p) video can be record-ed automatically onto a microSD/ SDHC/ SDXC card or a smart phone/tablet, mak-ing it possible to achieve a recording time of up to 145 hours. Footage captured can be played back by simply removing the microSD card from the camera and insert-ing it into your chosen device.
panasonic sets new security standards in smart Home cameras
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com65
360VisionTechnologyIn-troducesEclipseHDStain-lessSteelExtremeLowLightCamera
360VisionTechnology,theleading
UKCCTVdesignandmanufacturing
company,continuestoexpandtheir
camerarange,withtheadditionof
thenewEclipseHDStainlessSteel
colour/monocamera
Manufactured from stainless steel
316L, Eclipse HD Stainless Steel
features 1080p high definition ultra-low
light Sony STARVIS camera module
technology, and is IP65 certified to pro-
vide reliable scene coverage and opera-
tion in the most challenging of environ-
ments and applications.
The 24V AC/ DC or PoE powered
Eclipse HD Stainless Steel can deliver
two simultaneous video streams up
to 1080p (25/30fps), and performs in
extreme low light conditions deliver-
ing useable monochrome video images
down to just 0.0008 lux.
Featuring 30x optical zoom, the
new addition to the 360 Vision camera
range is ONVIF ‘S’ compliant and SDK
compatible for easy system integration
and control via popular VMS plat-
forms. Additionally, built in EDGE re-
cording is available with 128 or 256Gb
on board storage, with continuous/ FTP
upload/ network loss/ alarm scheduled
recording available as an option to on-
board storage.
Further options include dual white
light and Infrared (IR) LED Sirius light-
ing technology. The white light option
delivers up to 60m of light for colour
video at night, with narrow, medium and
wide-angle lenses for maximum adjust-
ability from 9 to 45 degrees of coverage.
A choice of standard IR 850nm or covert
940nm is available to suit specific light-
ing requirements.
PreventionAgainstTerror:MSSScreeningVehicleSetsaNewStandard–GeutebruckProvidesaVideoSolution
Oktoberfest,Carnival,Christmas
markets,orsportingevents:Pro-
tectingpublicspaces,eventsand
facilitieshasanentirelynewlevelof
urgencyduetotheglobalthreatof
terrorism
MSS (Mobile Screening Solutions)
is a newly established security
consortium that addresses this challenge
by developing a unique, fully equipped
screening vehicle as a mobile check-
point (prevention tool).
Geutebruck is a premium partner of
MSS and equips it with video solutions.
With the increasing threat of acts of
terror and violence, it becomes ever more
important to protect crowds of people.
The greatest risk emanates from bomb at-
tacks, positioned either on the attacker’s
body or placed in a vehicle, and from
hidden weapons. They need to be tracked
down before they can reach critical areas
with large numbers of people.
With the MSS screening vehicle,
the vision of a fully integrated mobile
security concept becomes reality. As a
mobile security center, it carries inno-
vative detection and screening equip-
ment, including metal and liquid explo-
sive detectors.
People and baggage are scanned in
the vehicle through walk-through slots
and they can also be connected with mo-
bile scanners outside the vehicle.
This all happens in real-time! All ac-
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com66
tivities, whether inside or outside the MSS
sprinter, are visualized using video secu-
rity solutions delivered by Geutebruck
specifically to meet these requirements.
GJDAcquiresEmbsec’sProd-uctTechnologyandTheirIntel-lectualPropertyRights
GJD,oneoftheworld’sleading
manufacturersanddesignersofpro-
fessionalexternaldetectorequipment
andLEDilluminatorshasannounced
thatithassignedanagreementto
acquirefromEmbsecAB,aSwedish
R&Dhouse,alloftheirinternetpro-
tocol(IP)andlasertechnologyplus
allrelatedintellectualpropertyrights
The IP technology will be integrated
into GJD’s D-TECT® detector and
Clarius® LED illuminator product rang-
es to provide automated and digitally
connectable security solutions.
Embsec’s laser scanning and time of
flight technology solutions will position
GJD as a leader in the field of laser de-
tection. These products are proving very
popular and provide extremely accurate
detection for high risk security applica-
tions. The external laser detectors will
be manufactured in-house at GJD’s UK
factory under the Laser-Watch® and
vFence® trademarks.
Traditional ‘analogue’ security and
lighting systems have been the most
popular choice for a variety of applica-
tions for decades. In 2016, the Internet
of Things (IoT) exploded into the secu-
rity world. More and more companies
are looking to seamlessly connect their
products (security or otherwise) to the
Internet for remote diagnostics, pro-
gramming and control applications. The
purchase of Embsec’s IP products, soft-
ware and technology allows GJD to of-
fer a fully integrated IP solution, with all
products being manufactured in-house
at GJD’s head office in Heywood, Great-
er Manchester.
One of the major advantages of hav-
ing a GJD security device connected via
the internet is that the high-speed remote
access permits full control and diagnostics
at anytime from anywhere in the world.
The IP technology will complement
GJD’s product range instantly. It will pro-
vide installers, specifiers and consultants
with a ‘one stop shop’ for IP connected
detectors, alarm devices and LED illumi-
nators for smart building networks.
MxMultiSensefrom MOBOTIX
ThenewMxMultiSenseMxBus
devicefromMOBOTIX,availableas
anindoorandweatherproofoutdoor
model,isanaffordableaccessoryto
increasesecurityinsideandoutside
ofbuildings
The device detects and reports
movements and noise levels and
measures the temperature and illumi-
nation level, and other environmental
information, which can then be used
for individually configurable func-
tions, such as activation of a signal
output at 5°C or 100Lx. All four sen-
sors can be combined as desired (via
event logic).
The compact MxMultiSense has
a very low power consumption of 0.1
Watt. With the same form factor as an
S15 sensor module it is therefore com-
patible with all sensor module mounts
available for wall or ceiling installa-
tion.
MxMultiSense can be used in many
different applica-
tions. For ex-
ample, it can
be installed
in a Dual-
M o u n t ,
Surround-
Mount or
PTMount,
in order to
add a PIR
sensor to the se-
curity system. It can also be installed in
a HaloMount in a suspended ceiling for
use in presence monitoring in rooms.
MxMultiSense performs its func-
tions in a decentralised manner, mean-
ing that it carries them out largely
autonomously with the help of MxMes-
sageSystem (MxBroadcast).
C M Y K
C M Y K
March-April 2017 www.malaysiasafe.com67
RedvisionAnnouncesSDKIn-tegrationwithIDISNVRsandVMSSolutions
Redvisionhasannouncedthatits
RV30™ruggedPTZdomecameras
willnowfullyintegratewithIDIS
DirectIP™NVRsandIDISCenter™
videomanagementsoftware(VMS)
Unveiled at Intersec 2017, the inte-
gration allows RV30™ plug-and-
play camera set up using the IDIS Direc-
tIP™ NVRs.
Much of the Redvision IP camera’s
advanced functionality is enabled, in-
cluding variable speed PTZ operation,
for responsive operator control; minimal
joy-stick latency; wiper, IR and white
light illumination by manual switch or
schedule; and programming of multiple
pre-sets and tours. The IDIS DirectIP™
NVRs record the camera’s Full HD, pri-
mary video stream, whilst using its low-
er resolution sub-streams for efficient
control, display and transmission.
IDIS is a specialist, South Korean
manufacturer of video surveillance
equipment.
Billy Hopkins, Technical Manager
of IDIS Europe, explains: “We initially
integrated with Redvision’s RV30™ cam-
eras using the universal ONVIF proto-
col. This worked immediately, with no
additional development work required.
However, Redvision’s firmware and
SDK development tool allowed us to
take full advantage of more advanced
functionality.
IDIS is pleased to add the Redvision
RV30™ to its portfolio. The market-
leading, X-SERIES™ rugged dome is
ideally suited to the tough, hot, outdoor
conditions typical of our Asian and Mid-
dle East market. It’s flat glass, camera
window and wiper allow us to remove
dirt, dust and water.”
SunstoneIPSystemsDevelopsSolarPoweredSecurityforOil-fieldsandRemoteLocations
Theself-sustainingsolutioncombats
thechallengesofdeliveringsurveil-
lanceinharshenvironmentswithout
electricityortelecommunications
Sunstone IP Systems Limited, a fast-
growing security systems integrator,
has designed a patent pending Solar IP
CCTV System (SICS), which delivers
high quality and high definition (HD)
surveillance in remote locations.
SICS was designed in response to
the challenge of delivering wireless
surveillance in remote and corrosive
environments combined with extreme
weather conditions to enable seamless
HD monitoring for high security op-
erations across a wide geographic area,
such as oilfields.
Typically, such environments lack
fixed buildings, power and connectiv-
ity, so it was integral that SICS was de-
signed to be completely standalone, eas-
ily transportable and rapidly deployed.
Completely self-sustaining, SICS
uses a 500w combination of rugge-
dized solar panels, which were custom
engineered for optimum solar angles in
a range of global locations. The energy
from the sun is harvested from the pan-
els and stored in a proprietary harsh en-
vironment battery system, which is de-
signed to withstand deep cycling along
with extremely
high and low
t empera tu re s .
The power gen-
erated from the
solar and battery
system can fuel
any type of IP
camera system,
wireless access
control, telecom-
munications or
LED lighting
system.
In addition,
SICS is fitted
with a system controller, which enables
real-time monitoring of all aspects of
the system, including solar and battery
performance, alongside a GPS location
alert on system threats such as extreme
temperature or snow build up. The solar
controller is vital to the effective opera-
tion of SICS, providing security opera-
tives with diagnostic information and
the ability to completely monitor the
system remotely.
C M Y K
C M Y K68
SecurityLink IndiastH-187/5 (1 Floor), Jeevan Nagar Market, Kilokri, New Delhi-110 014, India
Tel: +91 11 2634 2237 • Telefax: +91 11 4282 8080
Reach us onwww.securitylinkindia.com • [email protected]
C M Y K
C M Y K68
C M Y K
C M Y K68