c m ymalaysiasafe.com/wp-content/uploads/2018/11/malaysiasafe-mar-a… · c m y 68 c m y . c m y 68...

72

Upload: others

Post on 08-Aug-2020

36 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K68

Page 2: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K68

Page 3: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K1

Page 4: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K2

Year V • Issue 1 • March-April 2017(72 pages including 4 for cover)

Dear Readers,Greetings from MalaysiaSAFE!The recent spate of deaths in police custody have renewed calls by some to re-

visit the 2005 Police Commission’s recommendation for setting up of an Indepen-dent Police Complaints and Misconduct Commission (IPCMC) to ensure that a code of practice is to be adopted by the police with regard to arresting and deten-tion of persons. The Police Commission had also recommended an independent Custody Officer to be responsible for the welfare and custody of every detainee.

These recommendations were earlier rejected by the police and in lieu, the En-forcement Agencies Integrity Commission (EAIC) was set up with the mandate to educate the police and conduct investigations on other detention officers. The police have also implemented their own mechanism – Integrity and Standards Compliance Department (JIPS) but in spite of this, deaths have still occurred in custody, with 3 already reported this year.

Former Chief Justice Tun Zaki Azmi, who was a member of the Police Com-mission reiterates the need for an IPCMC to make the police force a more profes-sional organization. He says, “A death in custody goes beyond misconduct. It is a criminal act.”

The Human Rights Commission of Malaysia (SUHAKAM) Chairman, Tan Sri Razali Ismail also stressed that the authorities must implement reforms to build a more rights-respecting department. If death in police lockups is deemed unac-ceptable, then the Government should exercise political will and convince the police that the IPCMC can actually protect their interests.

On the national security front, Malaysia’s counter-terrorism efforts and mod-eration agenda have been drawing much attention at the international level, de-spite being a small nation. Most recent is the call from New Zealand to conduct trainings in the field of anti-terrorism and deradicalisation.

New Zealand’s Attorney-General Christopher Finlayson, who is also the min-ister responsible for the country’s security intelligence agencies, was impressed by Malaysia’s preventive approach in combating terrorism and its success in deradicalisation. This, after a similar interest shown last year by India’s Prime Minister Narendra Modi to allow Indian enforcement officers to come to Malay-sia and learn about deradicalisation and rehabilitation efforts.

In this issue of MalaysiaSAFE, we bring you a white paper on using net-work video for setting up a versatile perimeter protection. We also carry a feature article on Best Practices for Smart Commercial Buildings and a few in-teresting case studies on critical in-frastructures. Other notable contri-butions include articles and forecasts by renowned authors/ market survey organisations.

Till our next issue, stay safe and happy reading!

From the Publishers

Mior Roslan Bin Dato Mior Mohd JaafarExecutive Director

HP: +6017-2114492

Executive Director Mior Roslan

Bin Dato Mior Mohd JaafarHP: +6017-2114492

E: [email protected]

Editor & DirectorMior Mohamed Ridzuan

Bin Mior RoslanHP: +6012-2822312

E: [email protected]

Advertising and SalesE: [email protected]

Registered Office:PM Security Media Sdn Bhd

(976457 H)B-5-8 Plaza Mont Kiara,

Mont Kiara, 50480, KL, MalaysiaP: +603 2726 2534

Fax: +603 2726 2535Web: www.malaysiasafe.com

Printed by Vinlin Press Sdn Bhd on behalf of PM Security Media Sdn Bhd (976457 H) from B-5-8 Plaza Mont Kiara, Mont Kiara, 50480, KL, Malaysia.

All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, me-chanical, photocopying, recording, or otherwise without the prior written consent of the publisher.

(The views expressed in this magazine are those of the authors and do not nec-essarily reflect those of MalaysiaSAFE.)

Page 5: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K3

© 2017 Honeywell International. All rights reserved.

For more information please contact us [email protected]

Honeywell International Sdn Bhd1st Floor, Block B, No. 10, Jalan Bersatu 13/446200 Petaling Jaya, Malaysia

Introducing the latest additions to Honeywell’s

Performance Series IP Family…the new, affordable,

and easy-to-install 1080p and 4MP Wide

Dynamic Range IP cameras. Advancing quality

and reliability to the next level, with outstanding

picture clarity and easy system integration. Ideal

for small to medium businesses such as retail

stores, petrol forecourts and medical offices.

What are you waiting for? Make that switch

to IP technology now, with Honeywell’s latest

Performance Series cameras.

Performance Series IP CamerasAre you ready for Better Performance? Better Value?

IR EyeBall

Pancake Micro Dome IR Bullet

IR MFZ EyeBall

IR Rugged Dome

IR Rugged MFZ Dome

Malaysia_SAFE_AD_rev01_0217_V01.indd 1 17/02/17 6:52 PM

Page 6: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K4

MARcH-APRIl 2017

www.malaysiasafe.comC O N T E N T S

international updates

17-29 65-67application/ case studies

34-46

regional roundup • AxisCommunicationsOpensNewOfficein

KualaLumpur • IFSECSoutheastAsiaAppreciatesBSIA’S

SupportOvertheLast5Years06 GTC–BranchOfficeOpensinVietnam07 AlphafinitySecurestheEasternSugarCane

Factory • NECAppointsNewMDforNECMalaysia • HoneywellMorley–Solutionstohelpyou

EnsureProtectionofAssetsandLife

09 SECON,InternationalSecurityExhibition&Conference

10 D-RONMalaysiaEnterpriseDay2017

11 OTSystems’All-in-OneRapidDeploymentCCTVTrailer

12 AxisCommunicationsLookstoReviveSingapore’sDullRetailScene

05

08

feature articles

47 psiM review and forecast for 2017

3013

50iHs synopses for 2017

Best practices for smart commercial Buildings

2017 thales datathreat report

product sHowcase52 ArecontVision’sCyber-HardenedCameras53 HIKVISIONLaunchHigh-Performance

Explosion-ProofCameraRange54 Sony’sRM-IP500RemoteControllerPTZ

Cameras • SamsungWisenetPSeriesCamera • SurveonBoostsSurveillancePerformance56 AvigilonLaunchesAdvancedSearch

Technology57 MilestoneReleasesHighestPerformingVMS58 Viakoo’sProactiveServicesBoostIntegrators

59 3xLOGICVIGILCentralManagementSoftware

60 ProximTsunami®10100CPEandCPA

• QNAPCinderDriver

• MorseKeyWatcher®atICETotallyGaming2017

62 BarcoSuper-NarrowBezelTiledLCDVideoWalls

63 MoxaOnCellG3150A-LTEGateway

64 PanasonicSmartHomeCameras

61

55

wHite paper

14 drawing the line: network Video for flexible and Versatile perimeter protection

Page 7: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com5

regional roundup

Axis Communications, the market

leader in network video, had an

official opening and ribbon cutting cer-

emony for their newly revamped office

at Menara UOA Bangsar, Kuala Lum-

pur. Over 30 of Axis’ industry partners

and representatives were in attendance,

including the guest of honor, the Ambas-

sador of Sweden, H.E. Mr. Dag Juhlin-

Dannfelt.

The new office occupies a total

space of over1,500 square feet, giving

Axis the capacity to conduct trainings

for the Axis Certification Program and

demonstrate its all-inclusive end-to-

end solution offerings specifically for

the Malaysian market. The new office

is equipped with a comprehensive so-

lution showcase area where customers

can get a hands-on experience and learn

about the latest cutting-edge technolo-

gies the company has to offer. Those

present during the ceremony

were treated to a live demon-

stration of Axis’ new Q1659

Network camera, the first

to combine professional-

caliber photographic imag-

ing technologies from Canon

with proven surveillance

technology. Also being dem-

onstrated was Axis’ retail

optimization solutions from

Cognimatics.

Mr. Magnus Zederfeldt,

Regional Director for South Asia Pacific

at Axis says, “Actually the opening of

this new office is the culmination of six

years of being in Malaysia already. Why

we are putting more investments to grow

within this region is because we realize

that the end-users are starting to under-

stand what a quality integrated solution

is all about. We can see that in Malaysia

it is growing for the past two years, and

therefore I am very excited about the

company’s prospects here. There are a

lot of opportunities for all of us, so we

are looking forward to a bright future

ahead.”

Axis Communications has a strong

presence in the South Asia Pacific re-

gion, with branch offices in countries

such as Australia, Singapore, Indonesia,

Malaysia, Philippines, Thailand and Vi-

etnam. As part of its long-term growth

strategy, the Sweden-based company

plans to expand even further in the fu-

ture to better serve local markets.

axis communications opens New Office in Kuala Lumpur

ifsec southeast asia appreciates Bsia’s support over the last 5 YearsIFSEC Southeast Asia, the most prom-

inent security industry event in the

ASEAN region, appreciates the BSIA

team for their continued and invaluable

support over the last 5 years. IFSEC

South East Asia is a highly successful

extension of the world leading IFSEC

brand and provides UK security suppli-

ers with a unique opportunity to meet

with new and existing customers from

the region.

Simon Mills (Group brand director

for IFSEC International) commented,

“We are delighted for the continued sup-

port by the BSIA, UK Pavilion and UK

companies. We look forward to working

with you all in 2017 and would like to

say a special thank you to the BSIA for

regional roundup

(Left to right): Jonathan Keat, Distribution Sales Manager ASEAN with Magnus Zederfeldt & Winston Goh

Page 8: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com6

regional roundup

their continued support.”

IFSEC Southeast Asia provides ven-

dors with the chance to meet with over

10,000 customers from over 51 coun-

tries, all under one roof, where the con-

centration is firmly focused on security

and fire safety. It is the perfect place to

showcase your products face to face to

the entire buying chain, with 86% of all

visitors empowered with purchase mak-

ing authority.

A blend of leading UK security and

fire safety companies will come together

for a dedicated UK Pavilion showcasing

the latest products on offer as well as the

expertise and innovation associated with

the UK’s security and fire industries.

Participating companies include world

leaders in their fields such as Apollo Fire

Detectors, Cova Security Gates, FFE,

HAES Systems and TDSI.

IFSEC Southeast Asia will next take

place 6-8 September 2017 at the Kuala

Lumpur Convention Centre.

GTC, a Malaysian manufacturer of

surveillance solutions and security

software recently announced the open-

ing of their branch office in Ho Chi Minh

City, Vietnam. Located at the Tecapro IT

Building in Tan Binh District, the new

office was set up to manage projects se-

cured in Ho Chi Minh City, Hanoi and

Danang. The grand opening was offici-

ated by the Consul General of Malaysia

H.E Mr. Sofian Akmal. Also present

were Mr. Yazrin Syakhairi, Vice-Consul

(Trade), YBhg. Dato Theng Bee Han,

President of Malaysia Business Cham-

ber (MBC) Vietnam and members

of MBC.

GTC is a reliable Malaysian

surveillance system which is en-

dorsed by the Ministry of Interna-

tional Trade and Industry (MITI),

Malaysia External Trade Develop-

ment Corporation (MATRADE),

and Ministry of Domestic Trade

Cooperative and Consumerism

(MDTCC). The company was

awarded the SME Excellence

Award in 2016 by the ASEAN business

Advisory Council of Malaysia.

Mr. TT Teoh, Managing Director of

GTC said, “We are always improving our

products and services to maintain con-

sumer’s trust and earn the privilege of

being the first choice brand of security

providers from Malaysia. We assure you

that our continuous excellent service

and innovation will justify your confi-

dence in GTC.”

Having a global presence through

export and franchise in more than 10

countries such as Australia, China,

Chile, Cambodia, Egypt, India, Indo-

nesia, Italy, Middle East, Singapore,

Sri Lanka, and Thailand, the opening of

their new office aims to explore other

new markets in Vietnam.

For more info: www.gtc.my

GTC – Branch Office Opens in Vietnam

H.E Mr. Sofian Akmal, Consul General of Malaysia (left) with Mr. TT Teoh, Founder - GTC (Right)

(From Left-Right) Mr. Lim Chin Keong, Mr Tuan Le, Mr. TT Teoh, Mr. Sofian Akmal, Dato’ Theng Bee Han, Mr Hoang Anh Quang, Mr Pham Minh Tuan & Mr Yazrin Syakhairi Mahlan

Page 9: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com7

regional roundup

Eastern Sugar and Cane Plc (ESC) -

the largest sugar producer in Thai-

land’s eastern region has manufactured,

and sold sugar and electricity for more

than 56 years. It has adopted the fully

integrated system in running its busi-

ness, utilizing all the raw material parts

including wastes.

Currently, ESC has a cane crushing

capacity of 32,000 tons per day, and has

an electricity generating capacity of 59.8

megawatts, of which 55 megawatts are

generated from its biomass power plant

and the rest from biogas power plant.

ESC also sells 31 megawatts to Elec-

tricity Generating Authority of Thailand

and Provincial Electricity Authority.

Challenge and solution:24/7 central management and monitoring by video wall solution

Alphafinity has never been afraid

of diverse challenges. ESC cov-

ers a large operating area which in-

cludes indoor and outdoor spaces, sugar

manufacturing areas, power generating

plants, offices and surveillance booths.

Alphafinity’s diverse surveillance prod-

ucts can be found across

ESC, even at the power

plant area that operates in

a very high temperature

environment.

For the outdoor zones

and manufacturing ar-

eas, Alphafinity’s I267

Starlight bullet cameras

were installed. The I267

full HD 1080p resolu-

tion in 16:9 and WDR

Extreme 140dB bullet camera provides

crystal clear coverage in bright daylight

and through darkness. Even if the fac-

tory is located in extreme environments

with high temperature range fluctuation,

it is not a problem for the I267 camera

because of its IP-67 rated housing and

wide range working temperature. The

1267 camera is protected against dust

and ensures operation under all weather

conditions.

For Indoor spaces throughout ESC,

the A4131 Starlight dome cameras in-

stalled strategically throughout the area

provide clear imagery regardless of

lighting conditions. The A4131 camera

features Exmor WDR sensor and Smart

IR LED; which can

capture both dark and

bright parts of an im-

age with double shut-

ters, enabling two

frames to be combined

to generate a highly

realistic image.

Besides high qual-

ity network cameras,

a central management

software (CMS) for the control room

is of utmost importance for the whole

security system. Live viewing from all

cameras 24/7 across the ESC is impor-

tant, especially to check on the manu-

facturing status or any intruders around

highly critical areas.

Alphafinity’s VD64 is widely applied

in this project. VD64 is a H.265 4K UHD

hardware decode Linux-embedded video

decoder, offering high performance video

wall decoder solution. It can monitor up

to 64 channels live-view on local display

via HDMI, Display Port and VGA con-

nectors and supports 4K UHD network

camera. It also connects streaming from

both IP cameras or NVR.

Feedback from Senior Engineering

Leader of ESC Security department, Phat

Rattanawan, “The diversity of Alphafin-

ity products allow our company to develop

comprehensive and customized surveillance

solutions to meet the unique requirements. It

was an excellent decision to acquire the high

quality system with user friendly operation.

We can easily expand the system based on

situational and financial requirements in the

future.”

Alphafinity Secures the Eastern Sugar cane factory and power plant in thailand

regional roundup

Page 10: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com8

regional roundup

Honeywell Morley

has been involved

in the manufacturing and

distribution of fire detec-

tion and alarm equipment

for over 20 years. It is

one of the world’s leading

manufacturers of analogue

addressable control equip-

ment with fully trained

and accredited distributors

and regional support op-

erations around the globe.

Honeywell Morley

has a wide range of prod-

uct portfolio that enables

customers to design and

deliver a fire alarm sys-

tem that best suits the

most complex and pre-

vailing market needs. All

of its fire detection and

alarm control panels are

designed to meet EN-54

relevant part standards

and carry approvals from

international bodies such

as Loss Prevention Cer-

NEC Corporation of Malaysia Sdn.

Bhd. has appointed Mr. Chong

Kai Wooi as its new Managing Director.

He will be responsible for the business

growth and operations of NEC in Ma-

laysia.

Mr. Chong has 22 years of experi-

ence and in-depth understanding of the

IT industry, having held a number of

key roles in sales management, account

management, business development,

consultancy and pre-sales activities

since he started his career in 1994.

He joined Hewlett Packard (M)

Sdn. Bhd. in 2004 and later in 2013, he

was the Head of Consulting for HPE

South East Asia Taiwan & HK Network

Consulting practices. In that regional

role, he drove network transformation

projects with large enterprise custom-

ers, providing effective services that

are critical to manage and streamlining

their business for competitive business

advantage.

During his tenure as the Country Di-

rector of HPE Malaysia, Global Industry

Verticals and Strategic Alliance from

2015-2016, he was responsible for driv-

ing sales growth in the enterprise and

public sector segments and securing the

customers’ adoption of the company’s

products and solutions allowing custom-

ers to achieve competitive business ad-

vantages.

“It is indeed a privilege and honor to

be entrusted with the responsibilities as

the Managing Director of NEC Corpora-

tion of Malaysia, a company that is at the

forefront of technological breakthroughs

and spearheading a brighter world with

its cutting-edge products and solutions.

I look forward to working hand-in-hand

with the staff to spur NEC to greater

heights in Malaysia,” said Chong.

Mr. Chong replaces Mr. Andrew

Lee, who will be leaving the company

at the end of January after more than 5

years in NEC.

NEC Appoints New Managing Director for NEC Malaysia

Honeywell Morley – Solutions to help you Ensure Protection of Assets and Life

regional roundup

Page 11: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com9

regional roundup

Korea’s leading B2B security exhibi-

tion, SECON, International Security

Exhibition & Conference, will be held on

15-17 March 2017, at KINTEX in Seoul.

With the emphasis on global ‘protec-

tionism,’ countries around the world have

secon, international security exhibition & Conference, takes Place in Korea in March

been actively enacting new laws and seek-

ing to implement enhanced security and

safety countermeasures. It is said that the

world is now entering the fourth industri-

al revolution era, with the emergence of

Artificial Intelligence (AI), the Internet

of Things (IoT), Big Data,

and so forth. As security

threats become more seri-

ous due to the impact of the

fourth industrial revolution,

‘Security’ is becoming the

basic infrastructure of all

industries.

The security indus-

try in Korea is growing

at an annual growth rate

of 5%~10%, and Korea is

seen by the world’s leading

security enterprises as a market that is

playing an important role as a ‘testbed’

for new technologies based on Korea’s

tification Board (LPCB) and locally by

the Fire and Rescue Department of Ma-

laysia (BOMBA).

With a dedicated global research and

development team in Bangalore, India to

deliver continuous product development

and solutions, Honeywell Morley fire

systems meet not only existing customer

needs but is easily scalable to tackle the

challenges of tomorrow.

The Honeywell Morley portfolio com-

prises the following:

● DXC panels which are available in 1,

2 and 4 loop versions.

● Analogue addressable detectors such

as smoke, heat, photo-thermal and

duct detectors.

● Manual call points with unique plug

and play installation concept.

● Addressable alarm sounders and

strobes with anti-tamper and in-build

isolations options.

● Input and output modules.

● Photo thermal IR detectors with

unique multi-criteria sensors which

incorporate photoelectric, thermal

and IR sensing elements.

Benefits of choosing Honeywell Mor-

ley:

1. Scalable & reliable for any applica-

tion.

2. Ease of integration.

3. Simple installation and commission-

ing.

4. Easy maintenance.

Honeywell Morley provides the

ideal solution for small to medium

sized businesses which require fire

safety technology that is cost-effec-

tive, easy to install, operate, and main-

tain. This is important in view of the

fast-evolving mid-market fire indus-

try; a result of rapid urbanization and

increasing investments in Tier 2 and

3 cities. The growth of the industry is

also due to heightened awareness for

fire safety applications as well as the

gradual shift from conventional to ad-

dressable systems by small and mid-

sized installers.

For more info: www.morley-ias.co.uk

● Held at Korea’s larg-est exhibition venue, KINTEX in Seoul, on 15-17 March 2017.

● ITsecurityandphysi-cal security systems covering every indus-try segment, all under one roof.

● Strengthened globalnetwork through co-operation with UBM,the organizer of IF-SEC.

Page 12: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com10

regional roundup

strong IT infrastructure.

Hikvision, the world’s number one

video security enterprise, and Dahua

Technology, China’s top two enterprises,

have announced they will participate in

SECON 2017. In addition, global se-

curity enterprises including Gunnebo,

FLIR Systems, Optex, Honeywell, HID

Global and the leading security enter-

prises from Korea including Samsung

S-1 Corporation, Hanwha Techwin,

Kumho Petrochemical will join the

show. All exhibitors in SECON 2017

will be introducing the latest security

trends as well as showcasing their new

technologies and products.

With a six-year track record, SECON

provides domestic and international se-

curity solutions for buyers from a wide

range of industries and sectors includ-

ing government & public offices, local

government, national defense, finance,

education, security manufacturing, com-

puter/ internet/ telecommunication, SI,

security departments, electronics/ con-

struction, enterprise, services and others.

Of the 44,358 visitors who attended SEC-

ON 2016, 60.8% were C-level executives

or decision makers, and 25.4% of total

visitors were hands-on managers who are

actively involved in security work.

Since its debut in 2012, the number

of exhibitors at SECON has grown by an

average rate of 13% each year. This year,

64% of total exhibitors showed their ea-

gerness to come back to the show by re-

booking their stands for SECON 2017.

It is highly anticipated that the global

network will be strengthened through

close cooperation with the UBM Group,

the international organizer of many

leading exhibitions and conferences.

The UBM Group is well known as the

organiser of ‘IFSEC International,’ one

of the world’s top three security exhibi-

tions, and ‘Black Hat,’ the world’s most

prominent security hacking conference.

SECON offers the optimal business

platform for the security industry by

providing a one-to-one business match-

making service and a hosted buyer pro-

gramme to meet the needs of exhibitors.

These services are the powerful, effec-

tive and intuitive tools allowing exhibi-

tors to search for and arrange meetings

with qualified buyers.

Demand for exhibit space at SEC-

ON 2017 is high with remaining exhibi-

tor booths being sold rapidly.

For more info: www.seconexpo.com

D-RON Malaysia Sdn Bhd recently

hosted its first MALAYSIA EN-

TERPRISE DAY 2017 for end-users at

the cosy yet luxury RAMA V Thai fine

cuisine restaurant in Kuala Lumpur. The

event was organized by D-RON Malay-

sia Sdn Bhd, an entity of D-RON Group,

together with market leading partners

AXIS Communications®, Milestone

Systems© and DELL EMC©.

At the event, Mr Ivan Tan, Deputy

Director of D-RON Group gave the

opening speech which was followed with

the keynote address titled ‘Solutions for

a complex world’ presented by Muham-

ad Khairul bin Kadri, Presales Specialist

of D-RON Malaysia. After a short tea

break, Mr Ng Kiam Hwa, Channel Busi-

ness Manager of Milestone Systems, Mr

Philip Siow, Senior Consultant of AXIS

Communications and Mr Raymond Koh,

d-ron Malaysia enterprise day 2017 - solution for a complex world

Page 13: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com11

regional roundup

With today’s challenges for an ef-

fective surveillance solution, a

fixed surveillance system can fall short

in keeping families and communities

safe. The current emergence of unpre-

dictable threats within locations with-

out fixed amenities like electricity and

proper lighting calls for a surveillance

system that is highly-mobile and can be

swiftly deployed.

OT Systems has designed and built

a state-of-the-art Rapid Deployment

CCTV Trailer which is intelligent and

user friendly. Available in 3 sizes which

can be deployed for any urgent surveil-

lance need, each cart is equipped with a

customized surveillance system.

From the top of a 6-meter mast, PTZ

ot systems’ all-in-one rapid deployment cctV trailer

Business Development Manager of

DELL EMC took turns to showcase

their world renowned technologies

in surveillance, video management

and data storage solutions. D-RON

MALAYSIA ENTERPRISE DAY

2017 was organised to highlight

the importance of agnosticism in

modern video surveillance solu-

tions, integration, video analytics,

the concept of Internet of Things

(IoT) and the convergence of the

unified security management.

Invited customers from government,

banking, commercial, logistics, transpor-

tation and consultants who attended the

event were impressed with enriching in-

sights on the latest market trends. During

the demonstration showcase, customers

were able to get a hands-on experience

of the integrated solution with the latest

product technologies in the market.

The event ended with a lucky-draw

and group photo session, followed by

delicious lunch provided by RAMA V

restaurant.

For more info: www.d-ron.com

cameras are installed to offer

high quality 360-degree day

& night surveillance and video

analytics. Signals are transmit-

ted remotely by a Wi-Fi or 4G

router up to 50km. A few CCTV

trailers can be deployed simul-

taneously within various loca-

tions to create a modu-

lar surveillance system

with a Rapid Deployment

Command Centre.

Changing incident

locations and the una-

vailability of power

supply on location is not

a problem as the CCTV

trailer can operate on batteries, solar

Page 14: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com12

regional roundup

Axis Communications aims to rede-

fine local brick-and-mortar store

operations and customer engagement,

with the launch of its video network so-

lution. The new solution offers HD TV

image quality, intelligent video func-

tions and analytic capabilities. These

will support retailers in their efforts to

remain productive, reduce manpower

reliance, gain consumer insights, and

ultimately, win back customers from e-

commerce players.

The changing retail landscape

Traditional retailers are facing chal-

lenging times. Rising rentals, and

the tightening labour market, have led to

higher operational costs for store owners.

Big players, such as New Look, Celio and

Carrefour, have exited Singapore as they

struggle with slow in-store traffic, and

competition against e-commerce players.

As such, in September last year, the

Singapore government introduced the

Retail Industry Transformation Map,

which encourages physical retailers to

innovate and adopt emerging technolo-

gies to enhance customers experience.

“The consumer shift from brick-

and-mortar stores to e-commerce have

undeniably impacted traditional retailers.

However, we believe that brick-and-mor-

tar shops still have a competitive edge

over e-tailers, and that is the human as-

pect of a shopping experience,” says Mr

Magnus Zederfeldt, Director, South Asia

Pacific, Axis Communications, “Cus-

tomers want authentic experiences today,

and it is thus imperative for traditional re-

tailers to leverage emerging technologies

to enhance this. If implemented effective-

ly, brick-and-mortar stores can flourish.”

Key highlights of Axis’ network video solution

Axis’ network video solution is ca-

pable of helping retailers in two

key aspects:

1. Enhancedsecurity

● Axis network video solution pro-

vides high resolution store-wide im-

age coverage that enables retailers

to follow any suspicious behaviour

inside and outside a store, even after

operating hours.

● The new solution is able to distrib-

ute HD TV video over any kind of

IP network or the internet, assisting

investigators with crime and positive

identification.

2. Enhancedcustomerexperience

● When placed strategically, the net-

work cameras can assist retailers in

recording, measuring and better un-

derstanding consumer activity and

buying behaviour.

● Retailers will be able to identify the

popular areas in-store and optimise

the store and display layouts accord-

ingly.

Axis had previously launched its re-

tail solution in the region, and some of its

key customers include Hang Ten in Tai-

wan, and Volkswagen in China. Custom-

ers have feedback that the solution has

not only helped to effectively reduce their

operational costs, but also raised in-store

surveillance and employee productivity.

“Competition against huge e-com-

merce players, such as Alibaba and

Amazon, is heating up. As such, Singa-

pore retailers must focus on delivering

greater value to consumers through the

implementation of digital initiatives in

stores. This will enable local store own-

ers to stand against e-tailers, and bring

about enhanced experience for consum-

ers,” said Mr Zederfeldt.

axis communications looks to revive singapore’s dull retail

scene with Video network solution

power or AC power; which ensures con-

tinuous operation 24/7.

The CCTV trailer comes equipped

with emergency LED illuminator, real

time voice communication, alarms, and

automatic sensors for intrusion. The

CCTV trailer is rugged, weather-proofed

and sturdy enough to remain in place for

semi-permanent applications, providing

stable surveillance for any critical envi-

ronment.

For more info: www.ot-system.com

Page 15: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com13

feature

Commercial buildings are

evolving to cater to changes

in technology and workplace be-

havior, while presenting new op-

portunities to maximise efficiency

and productivity. Anixter recently

developed the Infrastructure as

a Platform (IaaP) model to help

building managers address the five

key technology areas that form the

building blocks for smart commer-

cial buildings. These five areas are:

managing risk, optimising network

performance, enhancing workforce

productivity, improving space uti-

lisation and enabling the Building

Internet of Things (BIoT).

Risk management

Today there is a strong emphasis on

providing a secure and safe envi-

ronment for the workforce. The trend is

toward a split between reactive security

and proactive security. Proactive secu-

rity anticipates risk and finds solutions

while the threat is still manageable.

Anixter has defined a five-layered ap-

proach to physical security that provides

the ability to deter, detect, delay, defend

and deny at every layer of a commercial

building to mitigate the risk of a breach.

Networkperformance

Forbes estimates that by 2020 there

will be 26 billion devices connected

to the Internet, adding $1.9 trillion in

global economic value through sales

into diverse end markets. More than

ever before, a high-performance struc-

tured cabling system plays an essential

role in operating a smart building. Ver-

satile physical layer connectivity ena-

bles an open system platform, where the

right media selection and cabling topol-

ogy can support multiple applications,

handle increased bandwidth and elimi-

nate network downtime.

Workforceproductivity

Social and economic drivers are plac-

ing a larger focus on how workforce

behavior can be improved with technol-

ogy. Adequate bandwidth is required to

facilitate the explosion of high-defini-

tion video and BYOD environments that

enable collaborative business communi-

cation with seamless network availabil-

ity throughout the building.

Spaceutilisation

According to a CoreNet Global sur-

vey, 63 percent of commercial real

estate managers expected portfolios to

downsize in the next year. With more

employees concentrated in smaller spac-

es and an increasing demand for dynam-

ic, collaborative areas, optimising real

estate effectiveness is important for the

productivity and efficiency of employees

as well as the building itself.

BIoTenablement

Cost and efficiency, life-cycle man-

agement and improved sustainabil-

ity are the main drivers behind the need

to enable a BIoT environment. An intel-

ligent building must be able to address

the challenges of open architecture de-

sign, supplier integration and migrating

to an IP platform.

Anixter will be joined by key suppli-

ers to share its latest product and solu-

tion offerings for these five key technol-

ogy areas.

For more info:

www.anixter.com/asiapacific

Best practices for smart commercial Buildings

Page 16: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com14

white paper

1. Introduction

Not knowing what is happening to

your property when you are away

is worrisome and discomforting. Yet,

knowing that something has happened,

but not exactly what, can be just as

frustrating, sometimes even worse. Net-

work video surveillance offers versatile

perimeter protection that allows you to

find out what’s going on around your

premises and why, and thereby enabling

resourceful and cost effective protection

of your assets.

2. Traditional measures forperimeterprotection

Safeguarding against trespassing,

theft and vandalism has long been

a part of daily business life. An increas-

ing number of enterprises are also expe-

riencing a growing need for continuous

security operations to counter what they

perceive as a rising global threat level.

To that end, they invest in various

perimeter protection measures, such as

short-distance radar, lasers, ground sen-

sors, motion sensors or motion-sensitive

fence wires. All these technologies per-

form well, and can, under many circum-

stances, capably detect an intrusion and

set off an alarm.

However, all of these systems have

an obvious and significant limitation:

they cannot distinguish between real

and false alarms. So for every alert,

someone – i.e., in-house security per-

sonnel or a security company provid-

ing the corresponding services – has to

decide whether or not a patrol should

be dispatched to the area. Not until

an inspection is carried out can it be

confirmed if there has been an actual

breach of the perimeter, and if this

breach is a threat that needs to be dealt

with, or whether it was caused by some-

thing harmless, e.g., an animal or mal-

functioning equipment.

Such procedures tend to be rather

time-consuming and will – especially if

the false alarms are frequent – eventu-

ally lead to more lax or even dropped se-

curity checks. Consequently, the whole

operation runs the risk of becoming very

expensive without providing any peace

of mind.

3. Network video for aclearpictureandstrong decision support

With network video cameras, on the

other hand, it is possible to build

an intelligent and reliable surveillance

system for perimeter protection. A vast

range of products from the leading sup-

plier makes such IP-based systems very

versatile and high performing, especial-

ly in difficult lighting environments and

in varying and demanding weather con-

ditions. Clear and crisp images facilitate

detection and identification of objects,

people and incidents, thus making it

easier to separate true alarms from false

alarms and other incidents that don’t

require any measures to be taken. Au-

tomated solutions and advanced video

drawing the line: network Video for flexible and Versatile

perimeter protection

Page 17: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com15

white paper

analytics software can further reduce the

need for monitoring staff.

3.1 Detect - verify - act: How it works

Basically, the main objective for

perimeter protection is to detect a

threat or an intrusion at the earliest pos-

sible stage. However, areas where valu-

able assets sometimes are kept, for in-

stance rail yards, bus depots, car parks or

harbors can pose a significant challenge

for security managers. The sheer size of

these places can be a problem. Lighting

conditions can also be troublesome, es-

pecially during nighttime if there is little

or no electric lighting available.

3.2 First line of defense - thermal network cameras

Modern thermal network cameras

are very sensitive and accurate.

They are unrivaled when it comes to de-

tection, making them ideal in a first line

of defense. Once a suspicious event has

been detected, the thermal camera can

be configured so that it automatically di-

rects a PTZ (pan/ tilt/ zoom) camera to

the right place.

The PTZ camera can be further used

for tracking a perpetrator or any suspi-

cious activity. Tracking can be done in

several different ways, from manual ma-

neuvering by joystick to auto tracking

relying on intelligent video analytics.

Working in parallel, these two camera

types form an unbeatable combination.

As opposed to day/ night cameras,

which use the near-infra red spectrum

of light, thermal cameras do not require

any light at all to operate. Instead, these

cameras are able to detect a person or an

object by visualizing the thermal radia-

tion they emit. This capacity makes the

cameras highly functional in complete

darkness as well as in fog, snow and

other challenging conditions.

Less apparent is their usefulness in

broad daylight. Thermal cameras are

also very efficient when it comes to dis-

covering people or objects that are ob-

scured by complex backgrounds or who

hide in deep shadows. Another advan-

tage is that they cannot be interfered by

bright lights or laser pointers.

3.3 OntopwithPTZdomesandfixedcameras

With thermal network cameras, oper-

ators can detect suspicious activity

around the clock. However, after detection

must follow verification before any deci-

sion on further actions can be taken.

As soon as a threat has been identi-

fied a horn speaker can be used to de-

ter or delay an intrusion by sending out

warnings or messages. Floodlights, si-

rens and similar components can also be

used for deterrence.

PTZ cameras are very adaptable and

can enable an operator to get on top of

a situation very quickly. After an alert,

he can pan and tilt the camera by remote

control and get an overview of the area

in question. From there it is easy to zoom

in on details. State of the art network

cameras deliver sharp images with very

high resolution enabling facial identifi-

cation or license plate recognition even

at very long distances.

There are many situations where

surveillance video with color is an im-

portant factor for successful identifica-

tion. Special low-light technology that

reduces noise and maintains colors even

in very dark conditions is therefore a

useful capability that greatly enhances

the user’s possibility to effectively rec-

ognize and identify people, vehicles and

incidents.

A visual close-up also helps the se-

curity operator to further analyze the sit-

uation at hand. Is the person that caused

the alarm an unwanted intruder with

possible ill intent? Or is it a visitor who

has come astray or is it in fact an author-

ized staff member?

The whereabouts of detected tres-

passers can be followed with a remotely

operated PTZ dome or well-placed fixed

cameras while an employee or a guard

patrol is guided to intercept the perpetra-

tor. Saved video of an intruder’s move-

ments and activities can later prove valu-

able evidence in a trial.

4.Scalable,flexibleandcostefficient

Large surveillance systems can com-

prise countless sensors, cover huge

areas and include a well-equipped com-

mand center with plenty of security per-

sonnel. Many of these large systems tend

to be complex and involve several differ-

ent technologies. Not only can this make

Page 18: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com16

white paper

them expensive and difficult to manage

but also risk hampering both flexibility

and scalability.

Furthermore, the bigger the site,

the greater the information load will

become, which can make it difficult to

run operations smoothly and effective-

ly. This is particularly evident when it

comes to the task of distinguishing be-

tween alarms and false alarms.

Using network cameras for perimeter

surveillance solves many of these diffi-

culties. A wide range of cameras, acces-

sories and various applications enables

end-users to obtain a comprehensive and

efficient video-based solution. Network

video also comes with a distributed sys-

tem architecture, which eliminates the

need for back-end hardware and makes it

flexible as well as scalable.

Detection and analysis of suspected

intrusions and other critical situations

might be fully or partially automated

with video analytics applications.

Traditional solutions, such as micro-

waves, infra-red or underground sensors,

leave the operator with the difficult chal-

lenge to understand the nature of the threat

every time an alarm is set off. However, if

the alert comes in the form of images it is

much easier for the operator to recognize

and categorize the type of alarm and react

accordingly. There is an immediate visual

understanding of the situation which not

only minimizes the time it takes to make

a well-informed decision but also reduces

the stress load, since false alarms can be

easily identified and ignored.

High system accuracy – i.e., a high

probability of detection in combination

with a low rate of false alarms – makes

guards and other operators more effi-

cient and facilitates alarm management.

Knowing with certainty which alarms

are serious and require immediate ac-

tion and which can be dismissed as false

also render the operator greater peace of

mind and better opportunities to stay fo-

cused. Network video is consequently a

very cost efficient way to improve over-

all security and works equally well re-

gardless if the alarms are handled locally

or remotely.

4.1 Automation - detection without eyes

Network cameras provide the high

quality images needed to enable

advanced features such as video mo-

tion detection, virtual fence or cross line

detection. Compared to a radar or laser

system that is typically installed on the

inside of a fence, a network camera can

be configured to sustain an alarm trigger

outside the fence and thus give an earlier

warning.

Large systems allow even more

advanced configurations and func-

tionalities. For example: Object filtra-

tion which reduces the number of false

alarms by only reacting to objects that

fulfil certain, pre-determined criteria,

such as size and speed etc. Similarly,

conditional alarm requires a number of

rules to be fulfilled before the alarm is

triggered. Another example of a useful

application to minimize false alarms is

masking area, which is a zone within

the camera’s field of view where events

don’t trigger alarms.

The most advanced application in

the market even enables detection of

multiple events occurring simultane-

ously in different places. It can analyze

detected events, then dismiss non-threat-

ening ones and notify security staff of

any potentially critical situations. The

bottom line is accurate detection and a

minimal number of false alarms.

4.2 Automaticnotification

When an alarm is triggered, a real

time notification can be auto-

matically sent to a single or multiple

simultaneous users, either by e-mail or

text. Using a remote viewing app, the

receiver can then see a live stream from

the camera or a recording of the trigger-

ing event. Based on this visual informa-

tion, it is easy to go ahead and decide on

the appropriate action.

IP-based systems are flexible and

scalable as well as being possible to in-

tegrate with other security technologies,

such as access control and motion sensors

etc. Relying on open industry standards

also facilitates the development of a wide

variety of third party applications.

5. Conclusion

Network camera surveillance for pe-

rimeter protection enables you not

only to detect a possible intruder at an

early stage, but it will also help you to

verify the extent and severity of a breach

as well as providing essential visual in-

formation to adopt an appropriate re-

sponse. Furthermore, by checking video

streams, it is easy to distinguish false

alarms from serious intrusions.

The versatility of network cameras, in

combination with many available applica-

tions and video analytics software, makes the

system flexible, scalable and cost efficient.

Finally, avoiding all the work, stress and

problems that are caused by misinterpreted

alarms will also pay dividends – if nothing

else, in the form of a greater peace of mind.

A network camera surveillance sys-

tem doesn’t leave you in the dark.

Page 19: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com17

InternatIonal Updates

Hikvision, the worldwide leader in

innovative, award-winning video

surveillance products and solutions, an-

nounces plan to establish an R&D Cen-

tre in Montreal, Canada and a Research

Institute in California’s Silicon Valley,

California.

“These two major investments un-

derscore Hikvision’s R&D globalisation

strategy and the commitment to provid-

ing innovative, cutting-edge technology

products tailored to the needs of our

Hikvision to establish r&d centre in Montreal and research institute in silicon Valley

worldwide partners and customers,” said

Yangzhong Hu, CEO of Hikvision.

Expected to open in 2017, the Mon-

treal Hikvision R&D Centre will focus

on engineering development. The Sili-

con Valley Hikvision Research Institute

will focus on broad technology research.

Montreal is an ideal location for the

new R&D Centre because of its excel-

lent talent pool and business-friendly en-

vironment. Likewise, the high-tech hub

of Silicon Valley is the logical location

for the Hikvision Research Institute.

Based in Hangzhou, China, Hik-

vision has more than 8,000 R&D en-

gineers, one of the largest in the video

surveillance industry, and it dedicates

about 7 percent of its revenues to R&D.

The R&D Centre and Research Institute

in North American will be the first es-

tablished outside of China. “This move

is part of Hikvision’s global strategy to

advance its local support and service in

regions outside of China,” said Hu.

The increasing demand for bandwidth

technologies requires servers and net-

work hardware to make them more versatile

to compensate multiple migration options

throughout their lifecycles.

Every data center faces the same chal-

lenge: the need to support increasing band-

width demands while meeting the demands

for scalability, flexibility and redundancy. In

an attempt to control the associated costs,

data center planners are looking to use high-

density cabling architectures and computing

equipment to maximize floor space utiliza-

tion. However, given the pace of innovation

in data center internetworking technology,

not designing the structured cabling infra-

structure correctly today may lead to costly

upgrades, increased downtime and reduced

competitiveness in the future.

A standards-based approach

When Anixter created the original

Levels program in the 1990s, it

recognized the challenges designers faced

when attempting to select the correct type

and grade of low voltage communications

cabling necessary to support the emerging

Ethernet protocol being deployed across en-

terprise networks.

Even though the industry has evolved

from those early 10 Mbps systems to estab-

lished industry standards that support the

100 Gbps systems seen in today’s data cent-

ers, the same challenges exist: the myriad of

choices relating to media selection, cabling

architecture and cable management.

Trafficischangingthedata center

Before the advent of cloud and server

virtualization technology, most of a

data center’s traffic traversed from the data

center local area network (LAN) to the wide

area network (WAN). With server virtual-

ization technology, the ability to decouple

the operating systems and programs from

the physical server improves server utili-

zation as multiple virtual sessions can be

hosted on a server. In today’s virtualized

environments, server-to-server communi-

cation accounts for 76 percent of traffic in

the data center1.

This change in traffic has led to a shift

in the top concerns for investment of mid-

market data center operators as the server

capacity demands have increased2:

● Data center connectivity: 82%

● Availability and resilience of data center

power, space, cooling and connectivity:

80%

● Control over the facility: 78%

● Access to the cloud: 75%

Data center road blocks tohigh-performancestructured cabling

Migrating to a high-performance struc-

tured cabling system isn’t as simple

as a rip and replace of the current cabling.

network Migration: High-performance structured cabling

Page 20: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com18

InternatIonal Updates

Five distinct areas need to be addressed

when evaluating a data center migration:

1. Amortization of cabling investment.

2. Infrastructure complexity.

3. Pace of innovation and adoption.

4. Speed of deployment.

5. Restrictions of legacy systems.

When determining a network mi-

gration strategy, you need to address

these areas while preparing to support

future technologies, whatever they may

be. However, they will certainly require

increased storage, speed, reliability and

responsiveness. In Anixter’s network

migration strategy, it’s important to ad-

dress several criteria within the data

center:

● Cabling topology: importance of design

and cabling systems.

● Media selection: copper and fiber tech-

nology.

● Complexity.

● Switch and general architecture.

● Flexibility: design for growth. For more info: anixter.com/datacenter

1. Source: Cisco; 2. Source: Forrester Research, US Firms <US$500M Revenue, 2014

Six of VIVOTEK’s intelligent IP sur-

veillance products have received the

2017 Taiwan Excellence Awards. The

products recognized include three H.264

models MS8391-EV, MD8563-EH and

APC (Automatic People Counting) camera

as well as the H.265 models, IZ9361-EH,

FE9381-EHV and SD9364-EH. Among

these six products, the SD9364-EH speed

dome camera was nominated for the Tai-

wan Excellence Gold standard award from

an impressive field of 528 products.

Owen Chen, the Chairman of VI-

VOTEK Inc., stated, “We are honored to

receive these Taiwan Excellence Awards.

We would like to express gratitude to

MOEA and Taiwan External Trade De-

velopment Council (TAITRA), the or-

ganizers of Taiwan Excellence Awards

and the honorable judges for their affir-

mation. VIVOTEK, as the leading net-

work surveillance solutions provider in

Taiwan, will continue our commitment

to delivering value-added products and

surveillance solutions, and further ex-

tend our footprint in global market.”

Six of VIVOTEK’s Outstanding IP Surveillance Products recognized by 2017 taiwan excellence awards

VIVOTEK's six award-winning net-

work cameras:

● H.265FullHDoutdoorspeeddome

network camera, SD9364-EH:

Equipped with 250 meters IR illumi-

nators and a 30x optical zoom lens,

the SD9364-EH also adopts VIVOT-

EK’s VAIR (Vari-Angle IR) Technol-

ogy, which is able to automatically

adjust the IR angle of IR illuminators

and provide both a brighter night view

and more consistent illumination.

● H.265FullHDoutdoorzoomlens

networkcamera,IZ9361-EH: Also

featuring VAIR (Vari-Angle IR)

Technology and a 20x optical zoom

lens, the IZ9361-EH is further armed

with IP67, NEMA 4X- and IK10-

rated robust housing, offering a su-

perior level of outdoor protection.

● H.265 5-megapixel outdoor fisheye

network camera, FE9381-EHV:

Equipped with a fisheye lens for 360°

surround view with zero blind spots.

The stylish FE9381-EHV is able to

provide broad coverage of open areas.

It is also designed with full EN50155

compliance to withstand shock, vi-

bration and humidity, making it a suit-

able solution for railway applications.

● 12-megapixel multiple-sensor net-

workcamera,MS8391-EV: Featur-

ing four 3-megapixel CMOS sensors

with a video alignment feature se-

cures superior image quality around

the clock and is ideal for outdoor

wide coverage protection.

● 2-megapixel vandal-proof mobile

dome network camera, MD8563-

EH: With full EN50155 Tx compli-

ance and IP67-rated rugged hous-

ing design, the streamline designed

MD8563-EH maintains stable and

reliable video surveillance during

vehicle movement.

● 3D Depth Technology APC (Auto-

matic People Counting) camera:

Specially designed for the transpor-

tation market, VIVOTEK introduces

APC camera. Utilizing VIVOTEK’s

3D Depth Technology to capture and

analyze passenger traffic with high ac-

curacy thus empowering users to im-

prove their operations and security.

Page 21: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com19

InternatIonal Updates

Leading life safety system manu-

facturer, Hochiki Europe (UK)

Limited, has strengthened its position

in the Italian market by acquiring fire

and security product distributor, De-

vice and Electronic Systems (DES srl).

Located in the historic city of Ve-

rona, DES srl is a distributor of life

safety solutions across Italy, with

many customers situated in the north

of the country. This acquisition allows

Hochiki Europe to expand the DES

distribution channels and further in-

crease its business within the Italian

market.

Hochiki acquires italian fire and security company

As part of the acquisition, the cur-

rent DES team will be retained, op-

erating from its Verona headquarters

and they will continue to service their

existing customers as usual. Hochiki

Europe will be looking to enlarge the

team and expanding the company’s

operation capabilities to support am-

bitious growth plans and an expected

increase in customer demand.

The incorporation of DES srl,

which was completed in January 2017,

comes as part of Hochiki Corpora-

tion’s wider growth strategy, VISION

2017, in which Europe is named as one

of the most important global markets

in terms of business expansion.

Graham Lowe, Director of Sales

at Hochiki Europe said, “By incorpo-

rating DES srl into Hochiki Europe,

new and existing customers across It-

aly will be given greater access to our

range of innovative products through

streamlined and trusted distribution

channels.

“During 2016, we made a number

of strategic investments to support our

growth plans across EMEA and we

will continue with this momentum in

2017, and beyond.”

Airbus Defence and Space has just

been awarded a contract to sup-

ply satellite communication systems for

UGAP, the French public procurement

agency. This 4-year contract covers the

supply of equipment and services for

fixed and mobile satellite communica-

tions (Satcom) in the Ku and Ka fre-

quency bands.

UGAP is a public institution and

the only national procurement agency

in France, serving mainly the state, local

authorities and hospitals. The contract

foresees all public technical services

to use a simple order form for Satcom

equipment and services anywhere on

French territory.

airbus provides satellite communications for the french administration

“As a pioneer in satellite communi-

cation services for governments, we are

pleased to make our expertise available

to the French administration,” said Eric

Souleres, Head of French business at the

Secure Communications business clus-

ter of Airbus Defence and Space.

Airbus Defence and Space’s users of

fixed or mobile (vehicle, trailer, or shel-

ter) Satcom stations include the Interior

Ministry’s General Directorate for Civil

Security and the departmental Fire and

Emergency Response Brigades, plus

about forty French departments.

Satcom enables voice and data com-

munications to be maintained, including

areas without mobile network coverage,

or when these networks are disabled fol-

lowing a natural disaster; or when there

is a risk of high traffic owing to events

such as terrorist attacks or the World

Cup.

Military and governmental users

worldwide benefit from the unique ex-

pertise developed by Airbus Defence

and Space in the field of satellite com-

munications. Besides covering the com-

plete range of frequency bands (L, C,

Ku, Ka, X and UHF), the company pro-

vides military satellite communications

to some of the most high-tech armed

forces in the world, including those of

the UK, France, Germany, Canada, the

US and NATO.

Page 22: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com20

InternatIonal Updates

survey reveals getting sdn live in the data center

is taking longer than expectedBy Cliff Grossner – Ph.D., Senior Research Director & Advisor, Cloud and Data Center Research Practice, IHS Markit

IHS Markit’s data center SDN survey

provides insight into how cloud and

telecom service provider data centers are

evolving for SDN.

Data center SDN deploymentsgoingslowly

Two-thirds of the service providers

participating in our 2016 survey are

still conducting lab trials of data center

SDN, down only slightly from three-

quarters in 2015.

The number of respondents in pro-

duction trials and live deployment in

2016 continued to be lower than expect-

ed by those taking part in the prior year’s

study; see the chart below.

Getting to live production is taking

more time than expected. This means

that the most innovation-driven part of

the market critical for new revenue –

SDN controllers, data center orchestra-

tion and SDN applications – is still wide

open. Although the leaders in the SDN

service provider data center market are

becoming clearer, especially for physi-

cal network equipment, we do not expect

the market to solidify until live deploy-

ments ramp.

Baremetalswitchingstalls

Bare metal switch ports comprise,

on average, 33 percent of respond-

ents’ data center Ethernet switch ports

(the same as our 2015 study). And, on

average, 24 percent of bare metal switch

ports are in-use for SDN, up from 12

percent in the 2015 survey.

The majority of bare metal switches

are still being deployed at large cloud

service providers (CSPs) because skilled

programmers who are adept at dealing

with bare metal switching are required

to ensure success.

By 2018, bare metal Ethernet switch

ports in the data center are expected to

reach 41 percent among operators sur-

veyed.

Service providers name Cisco and

Juniper top SDN vendors.

The leaders in the service provider

data center SDN market are solidifying

for physical network equipment.

In an open-ended question, we asked

respondents whom they consider to be

the top three data center SDN hard-

ware/ software product vendors. Cisco,

the big player in enterprise networking,

was identified as a top-three vendor by

72 percent of respondents, while Juniper

was named by 39 percent of respond-

ents.

Cisco continues to get traction with

its SDN solutions, including with edu-

cational institutions providing online

● Inthedatacenter,labtrialsforsoftware-definednetworking(SDN)arestilldominant over production trials and live deployments.

● Serviceproviderbaremetalswitchingdeploymentshavestalled,butmorebaremetalswitchesarein-useforSDN.

● CiscoandJuniperwerenamedasthetopdatacenterSDNvendorsbyrespondent service providers.

Page 23: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com21

InternatIonal Updates

learning for students, CSPs deploy-

ing self-service portals and enterprises

adopting hybrid cloud architectures.

Juniper, meanwhile, is gaining footing

with its contrail cloud and contrail net-

working solutions.

DatacenterSDNsynopsis

For its 30-page 2016 data center SDN

survey, IHS Markit interviewed ser-

vice providers that have deployed or plan to

deploy or evaluate SDN by the end of 2018

about their plans to evolve their data centers

and adopt new technologies over the next

2 years. Respondents were asked about

SDN deployment drivers, barriers and tim-

ing; expected capex and opex changes with

SDN; use cases; security technologies; ap-

plications; top-rated vendors; and more.

The International Association of

Chiefs of Police (IACP) and Du-

Pont Protection Solutions announced

recently that they inducted 27 officers to

the IACP/DuPont™ Kevlar® Survivors’

Club® in 2016.

The IACP/DuPont™ Kevlar® Sur-

vivors’ Club® honors law enforcement

personnel who, in the course of pro-

tecting the communities they serve,

have survived potentially debilitating

or life-threatening incidents thanks to

their body armor. The 2016 inductees

include officers serving in Colorado,

New York, South Carolina, Tennessee

and other states. The situations they

faced were as varied as the job of law

enforcement itself, but the outcomes

were the same: survival, the chance to

return home to family and continue do-

ing the jobs they love.

“We look forward to working to-

gether with DuPont in the upcoming

year to continue to raise awareness

of the importance of officer safety

practices,” said IACP President Don-

ald W. De Lucca, Chief of the Doral,

Florida, Police Department, “Through

the Center for Officer Safety and Well-

ness, IACP is committed to looking

at officer mental well-being, physical

health and tactical safety through a di-

verse number of programs. DuPont has

been a steadfast supporter of these ef-

forts and is equally committed to keep-

ing officers safe.”

For more than 50 years, DuPont™

Kevlar® has helped keep law enforce-

ment officers safe so they can in turn

help keep their communities safe. The

everyday dangers officers face while

protecting the public make the in-

creased use of body armor essential to

reducing the likelihood of death and

disability.

“DuPont continues to be commit-

ted to research and development of

new technologies with Kevlar® to help

maintain the safety of law enforcement

personnel and improve their chances of

survival in the event of life-threatening

situations,” said Steve LaGanke, Global

Marketing Manager, Kevlar® Protec-

tion, “We’re dedicated to helping protect

those who protect us.”

Founded in 1987, the IACP/Du-

Pont™ Kevlar® Survivors’ Club® has, to

date, honored well over 3,000 officers

whose body armor helped save them

from death or serious injury.

The International Association of

Chiefs of Police is a professional asso-

ciation for law enforcement worldwide.

For more than 120 years, the IACP

has been launching internationally ac-

claimed programs, speaking on behalf

of law enforcement, conducting ground-

breaking research, and providing exem-

plary programs and services to members

across the globe.

Today, the IACP continues to be

recognized as a leader in these areas.

By maximizing the collective efforts of

the membership, IACP actively supports

law enforcement through advocacy, out-

reach, education, and programs.

Through ongoing strategic part-

nerships across the public safety spec-

trum, the IACP provides members with

resources and support in all aspects of

law enforcement policy and opera-

tions. These tools help members per-

form their jobs effectively, efficiently,

and safely while also educating the

public on the role of law enforcement

to help build sustainable community

relations.

iacp/ dupont™ Kevlar® survivors’ club® Inducts 27 Officers in 2016

Page 24: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com22

InternatIonal Updates

Biometric technology company

Zwipe was introduced this week to

major card manufacturers and compa-

nies working in Fintech by Monica Mæ-

land, the Norwegian Minister of Trade

at a seminar organized and hosted by

Zwipe’s partner in Japan, Hitachi High-

Technologies.

The purpose of the visit by the Min-

ister was to meet with Japanese and

Norwegian businesses working together

in Japan seeking to strengthen the strong

cooperation between the two nations.

With an emphasis on innovation, espe-

cially in Fintech, the Norwegian govern-

ment has expressed a strong interest to

support companies like Zwipe.

The cooperation between Hitachi

High-Technologies and Zwipe was for-

malized with the outlook to collaborate

on both technical and business develop-

Brickcom Md/ Vd series ip cameras Obtain ECE R118 Certification

for european, usa & canadian automotive MarketsBrickcom’s MD/

VD mobile cam-

eras are now ECE

R118 certified. As one

of the most accepted

quality affirmations

for products used on

motor vehicles, ECE

R118 stands for more

fire resistance, reli-

ability and trust.

In most parts of

the world, the auto-

motive industry is re-

garded as one of the most conservative

and strictly regulated sectors. This is

especially true with the European auto-

motive market. To cope with such, for

many years Brickcom has dedicated it-

self to transportation

application and suc-

cessfully acquired the

essential certifications

including E-Mark and

EN50155. With ECE

R118 certified under

the Addendum 117,

Regulation No.118,

now Brickcom mo-

bile cameras can be

deployed in almost all

kinds of transportation

applications.

Models that meet the ECE R118

standard are designed in accordance

with the agreement of a vehicle type

which regulates the flammability of ma-

terials in passenger vehicles and requires

particular installations for automotive

appliance safety. Along with IP67, IK10

and EN50155 certification approvals,

Brickcom’s MD and VD Series mobile

cameras are certainly among the best

choices for automotive applications.

What is ECE R118 Certification?

Economic Commission for Eu-

rope (ECE) was set up in 1947

by ECOSOC aiming to promote pan-

European economic integration. The

UNECE Sustainable Transport Divi-

sion provides the secretariat services to

WP.29, the World Forum that incorpo-

rates into its regulatory framework the

technological innovations of vehicles to

make them safer and more environmen-

tally sound.

norwegian Minister of trade introducespartnership between Zwipe and Hitachi

High-tech to Major Japanese companies

Page 25: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com23

InternatIonal Updates

ment objectives. The Japanese market

for both e-money and payment cards is

fast growing as the people’s preference

to use cash is shifting towards more

secure and convenient alternatives. As

much as 40% of all transactions are cur-

rently made with cash, according to the

Japanese Fintech Association. In paral-

lel with this shift the Japanese payment

industry is recognizing the importance

of adopting open world standards, tar-

geting the Tokyo Olympics in 2020 as

the critical deadline for changes. This

activity is supported by the Ministry of

Economy, Trade and Industry (METI).

Additionally, biometric access control

is seeing significant interest in the Japa-

nese market, with many biometric alter-

natives already being adopted.

“At Hitachi we believe in collabora-

tive creation and that is why we have part-

nered with Zwipe. The solutions offered

by Zwipe in regards to payment, access

control and ID provide complimentary

offerings to our already strong and in-

novative solutions mix,” said Ichiro Mat-

suba, General Manager, Electronic Com-

ponents & Materials, adding, “We have

already deployed Zwipe Access solutions

in the market here in Japan and we have

seen significant interest for both Zwipe

payment and ID solutions.”

Zwipe was represented at the semi-

nar by their SVP of Sales and Market-

ing, Einar Boije, who held an hour-long

presentation to potential customers, rep-

resenting major card manufacturers and

companies working in Fintech. The pres-

entation focused on familiarizing the at-

tendees with Zwipe’s offerings as well as

detailing Zwipe’s go-to-market strategy

in Japan.

Speaking on the event, Einar Boije

commented, “We are very honored to be

working alongside our partners Hitachi

High-Technologies and to have such

positive support from the Norwegian

government. Zwipe’s global expansion

strategy is to establish and build strong

partnerships with industry partners who

have significant market impact and a high

level of competence. With Hitachi’s mar-

ket expertise and network we were able to

bring together many important decision

makers in the same room providing our

partnership a real opportunity to take our

business in Japan to the next level.”

LonTrend has launched a new range

of thermal cameras – LTCT03

capable to detect people, objects and

incidents in any hazardous areas at

resolutions up to 640x480 pixels. The

protection is 24 hours unhindered from

pitch dark areas to a sunlit border.

Built in Uncooled Microbolometer

FPA VOx sensor, the cameras integrates

high-performance image enhancement

algorithms. It also features four inno-

vative functionalities for image quality

enhancement: Automatic Gain Control,

Dynamic Image Enhancement, Dy-

namic Range Optimization and Active

Contrast Enhancement. These

features further minimizes the

influence of ‘hot pixels,’ making

images even sharper.

The cameras are available

with several lens options from

f=7.5mm to 50mm, are ONVIF

compliant and PoE supported,

and are easy to install and use.

Specialized in industrial

precision, LonTrend Corporation full-

fills its culture and mission – anticipat-

ing and exceeding customers’ expecta-

tions, and leading the way in die-cast

security devices with cutting edge in-

novations, superior performance and

the broadest selection. With business

spanning over 30 years, LonTrend is a

Taiwan-based precision and manufac-

turing company.

lontrend corporation launches thermal cameras - ltct03 for Hazardous areas

Page 26: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com24

InternatIonal Updates

The Fujitsu Cloud Internet of Things

(IoT) Platform is helping simplify

and accelerate the design, delivery and

management of high performance IoT-

based solutions – and is now available in

the Europe, Middle East, India and Af-

rica region, as part of the Cloud Service

K5 ecosystem.

Due to disruptive and rapidly chang-

ing market dynamics and customer ex-

pectations, businesses need to be agile

and responsive to remain competitive in

today’s business environment. As organ-

izations undertake digital transforma-

tions and digitalize processes to reinvent

how they operate, they become increas-

ingly reliant on IoT-based solutions to

generate and manage the new sources of

data that can provide truly holistic op-

erational visibility.

Fujitsu developed its Cloud IoT

Platform to address the management of

IoT deployments which can be complex,

time-consuming and can often require

specialist skills. The Fujitsu Cloud IoT

Platform enables customers to remove

complexity and benefit from a compre-

hensive, plug and play cloud-based solu-

tion to integrate selected IoT data into

mainstream business processes.

A rich set of APIs allow the collec-

tion and compilation of data from mul-

tiple sources, and Fujitsu provides a ho-

listic dashboard for managing data from

IoT devices. Consequently, customers

can deploy an IoT platform customized

to their exact needs, with effortless ex-

pansion to accommodate new devices

and data volumes. The straightforward,

pay-as-you-consume pricing structure

also makes financial planning easier and

eliminates the need for upfront capital

expenditure.

Conway Kosi, SVP and Head of

Managed Infrastructure Services at

Fujitsu EMEIA commented, “Very few

organizations buy IoT as a technology.

Customers want solutions to address

specific business needs, or to find a

way of transforming their processes.

In providing a complete, managed IoT

solution, Fujitsu enables them to jump

straight to reaping the benefits of an

IoT deployment, leapfrogging com-

plex and time-consuming planning and

implementation stages as they inte-

grate the data. Fujitsu’s comprehensive

Managed Services portfolio allows us

to partner with our customers, giving

them the opportunity to focus on the

end result instead of becoming over-

whelmed with the process – enabling

them to leverage the valuable IoT data

they have generated as they focus on

transforming their businesses.”

Vernon Turner, SVP and IoT Fel-

low at research company IDC com-

ments, “The IoT market is maturing

quickly. Enterprises around the world

are already integrating sensor data col-

lected and collated by IoT platforms

into production processes. This is

leading to the IoT increasingly becom-

ing accepted as the logical successor

to point solutions based on stand-alone

technologies, such as M2M and RFID.

However, the IoT is quickly reaching

an inflection point where just sensors,

technology and data are not enough

– enterprises need System Integra-

tors to help them combine their sensor

data with existing systems, and create

some meaningful business value from

the sum of the parts. At IDC, we call

this time to value, and our research has

recognized that what customers need

most of all are partners who both un-

derstand and can manage the complex-

ity of integrating IoT into existing IT

systems, with the ability to make the

IoT a valued part of mission-critical

business platforms.”

The Fujitsu Cloud IoT Platform

enables customers to manage sensors

and devices, collect, send and receive

the data generated and analyze this to

make real-time decisions. The platform

is plug and play so customers can easily

adapt it to meet their specific require-

ments. The multi-tenant nature of the

solution means it is cost-efficient and

easy to manage, while a broad-cross

section of functionalities makes it eas-

ier to integrate IoT solutions with one

another.

Fujitsu is providing its Cloud IoT

Platform to customers via its enterprise

Cloud Service K5. This next generation

cloud platform was specifically created

to enable customers to achieve effi-

cient, easy and cost effective enterprise

level digital transformations. Another

core element of IoT is edge computing.

In edge computing particularly related

to M2M and RFID Fujitsu has gained

a proven track record as a System In-

tegrator leveraging its GlobeRanger

iMotion platform. Fujitsu’s extensive

experience of seamlessly integrating

new IoT technology with existing leg-

acy systems makes leveraging business

intelligence data collected by means of

IoT more accessible than ever.

Fujitsu Cloud IoT Platform Simplifies and accelerates enterprise iot

Page 27: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com25

InternatIonal Updates

At INTERSEC 2017 Maxxess

launched MAXDashboard DI, a

world-first solution that can transform

the live management, monitoring and

verification of people in transit on big,

busy sites and multi-site estates, mak-

ing it quick, easy and affordable to pro-

actively pre-empt security situations,

optimise operational efficiency and cut

costs.

Building on successful pilot trials,

including six-months at a top Middle

East institution, MAXDashboard DI is

attracting strong interest from leading

organisations who want to improve in-

house security capabilities while get-

ting more value from their operational,

human resources and building manage-

ment processes.

Designed by Maxxess, the flexible,

feature-rich solution uniquely combines

multiple data inputs, including access

control feeds, with powerful big data in-

telligence, analytics and algorithms, to

create customised displays with tailored

filters that deliver dynamic live reporting

about the movement of people on-site.

Data is continuously gathered from

multiple sources – then mined, processed

and cross-referenced in real-time with a

wide range of human behaviour patterns

– both general and specific to individual

profiles – to identify anomalies and trig-

ger alerts about potentially suspicious or

unauthorised activity outside the norm.

As a highly versatile, open-source

solution, MAXDashboard DI is vendor-

agnostic, so can be seamlessly integrated

with any existing security system. It is

available as a pay-as-you-go service and

is highly scalable. Without upfront capi-

tal costs or technical barriers, it can be

up, running and delivering results fast.

Because each organisation is differ-

ent, rules and reporting filters are cus-

tomised to suit precise requirements.

The intuitive dashboard displays instant,

at-a-glance visibility of key metrics to

maximise ease-of-use by non-expert,

in-house teams. This makes it easy to

monitor the 24/7 presence, location and

movement of people on site, whether

employees, contractors, guests, del-

egates, visitors or the public, including

precise time of arrival and exit, routes

and dwell times.

This greatly improves operational

efficiency, to quickly verify, for exam-

global launch Big data dashboard to transform

on-site securityGlobal launch at Intersec 2017 builds on pilot trial successes

Maxxess solution to proactively pre-empt security alerts while cutting costs

“Conventional securitymonitoring isbasedona re-active response to historic events. MAXDashboard DIcompletelydisrupts thismodel. Itputs thepoweroflive,real-timemonitoring directly into the hands of your or-ganisation.Bygivingyoucustomisedviewsofyourentiresite,withtheabilitytodrilldowntothegranulardetailyouneed, it instantly visualises howyour vital security andoperationalprocessesareworking,while flaggingwhat

might requiremore attention. Furthermore, by combiningmultiple informa-tionfeedswithpowerfulbigdataanalytics,MAXDashboardDIbringsarichwealthofdata to life, transforming it intopreviouslyunseen intelligence todrivemorevaluefromyourexistingsecurityandoperationsinvestments.”

–LeeCoplandManaging Director, Maxxess, EMEA

Page 28: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com26

InternatIonal Updates

ple, that the right number of contractors

have checked in to work; precisely how

many cardholders are present on differ-

ent sites; if the number of visitors at an

on-site event matches registration crite-

ria; and that people’s presence in differ-

ent parts of the site complies with their

permitted status – including duration of

visit and access rights.

With self-learning algorithms, the

system continuously recalibrates its cri-

teria based on the latest, most relevant

data. It also references actual behaviours

against known norms. For instance, if a

specific employee changes their regular

route in and out of a building, under-

takes unusual activity on the corporate

network or accesses the site during a

scheduled vacation, these could trigger

alerts for investigation.

The dashboards can also enhance

operational processes such as identify-

ing when parts of a building are most –

or least – active; peak visitor flow times;

or the average Wi-Fi usage per session.

This gives teams the intelligence to

adapt processes, configure networks and

adjust building management systems

accordingly to optimise savings and ef-

ficiencies.”

Based on open system protocols,

MAXDashboard DI can take data from

any standard source including all ac-

cess control systems from any manu-

facturers with no need for bespoke in-

tegration.

consumers increasingly aware of online security risks, but hold Businesses

responsible for data Breaches, finds gemalto study

Gemalto recently released the find-

ings of its 2016 Data Breaches

and Customer Loyalty report, revealing

that consumers put responsibility for

protecting their personal data firmly at

the hands of the organizations holding

their data – and not themselves.

According to the 9,000 consumers

surveyed in Australia, Benelux, France,

Germany, Russia, UAE, Saudi Arabia,

India, Japan, United Kingdom, and

United States, 70% of the responsibili-

ty for protecting and securing customer

data lies with companies and only 30%

of the responsibility with themselves.

Yet, less than a third (29%) consumers

believe companies are taking protection

of their personal data very seriously.

This comes as consumers are becoming

increasingly fearful of their data being

stolen, with 58% believing it will hap-

pen to them in the future. More than 4.8

billion data records have been exposed

since 2013 with identity theft being the

leading type of data breach accounting

for 64% of all data breaches.

Where consumers see most risk

Despite becoming more aware of

the threats posed to them online,

only one in ten (11%) believe there are

no apps or websites out there that pose

the greatest risk to them and consumers

are not changing behavior as a result:

● 80% use social media, despite 59%

believing these networks pose a

great risk.

● 87% use online or mobile banking,

with 34% believing they leave them

vulnerable to cybercriminals.

● Consumers are also more likely to

shop online during busy commer-

cial periods such as Black Friday

and Christmas (2% increase online

versus -2% decrease in store), de-

spite 21% admitting the threat of

cybercrime increases a lot during

these periods.

Consumer attitudes on data breaches

Nearly six in ten (58%) consumers

believe they will be a victim of

a breach at some point, and organiza-

tions need to be prepared for the loss of

business such incidents may cause. The

majority of consumers who currently

use the following, say they would stop

using a retailer (60%), bank (58%) or

Page 29: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com27

InternatIonal Updates

social media site (56%) if it suffered a

breach, while 66% say they would be

unlikely to do business with an organi-

zation that experienced a breach where

their financial and sensitive informa-

tion was stolen.

How data breaches affect consumers

The study found that fraudulent use

of financial information has af-

fected 21% of consumers, with others

experiencing fraudulent use of their

personal details (15%) and identity

theft (14%). More than a third (36%)

of those who have been a victim of a

breach attribute this to a fraudulent

website. Clicking a bad link (34%) and

phishing (33%) were the next highest

methods consumers were caught by. In

keeping with the theme of putting the

blame at the organization’s hands, over

a quarter (27%) attributed the breach to

a failure of the company’s data security

solutions.

Lack of security measuresinfluenceconsumerconfidence

The lack of consumer confidence

could be due to the lack of strong

security measures being implemented

by businesses. Within online banking,

passwords are still the most common

authentication methods – used by 84%

for online and 82% for mobile banking,

and more advanced transaction security

the next highest for both (50% and 48%

respectively). Solutions like two-factor

authentication (43% online and 42%

mobile) and data encryption (31% on-

line and 27% mobile) trail behind.

Similar results can be seen in both

the retail space, with only 25% of re-

spondents that use online retail accounts

claiming two-factor authentication is

used on all their apps and websites, and

in social media, with only 21% using

the authentication for all platforms.

Only 16% of all respondents admitted

to having a complete understanding of

what data encryption is and does.

“Consumers have clearly made the

decision that they are prepared to take

risks when it comes to their security,

but should anything go wrong they put

the blame with the business,” said Jason

Hart, CTO, Data Protection at Gemalto,

“The modern-day consumer is all about

convenience and they expect busi-

nesses to provide this, while also keep-

ing their data safe. With the impending

threats of consumers taking legal action

against companies, an education pro-

cess is clearly needed to show consum-

ers the steps they are taking to protect

their data. Implementing and educating

about advanced protocols like two-fac-

tor authentication and encryption solu-

tions, should show consumers that the

protection of their personal data is be-

ing taken very seriously.”

● Only 30% of consumers believecompanies are taking their per-sonal data protection very seri-ously.

● 58% of consumers fear theywill be victims of an online databreach.

● 66%wouldbeunlikelytodobusi-ness with organizations respon-sible for exposing financial andsensitiveinformation.

ASSA ABLOY has signed an agree-

ment to acquire LOB S.A., a lead-

ing producer of locks, cylinders and pad-

locks in Poland.

“I am very pleased to welcome LOB

into the ASSA ABLOY Group. The ac-

quisition of LOB delivers on our strat-

egy to grow our presence in emerging

markets,” says Johan Molin, President

and CEO of ASSA ABLOY.

”LOB is a very attractive addi-

acquires loB in polandtion to the EMEA division, thanks

to its well-known brand in Poland

and its large installed base. LOB’s

variety of mechanical security prod-

ucts will complement the fire doors

offered by Mercor and the electro-

mechanical product proposition by

ASSA ABLOY Poland,” says Tzachi

Wiesenfeld, Executive Vice President

of ASSA ABLOY and Head of the

EMEA division.

LOB was established in 1927, is

headquartered in Leszno, Poland and

has some 440 employees.

Sales for 2017 are expected to reach

some PLN 96 million (approx. SEK 210

million) and the acquisition will be ac-

cretive to EPS from start.

The transaction is conditional on

regulatory approval and is expected

to close during the second quarter of

2017.

Page 30: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com28

InternatIonal Updates

The highly acclaimed Milipol Asia-

Pacific Conference, returns this year

from 4 to 6 April 2017 at the Sands Expo

and Convention Centre, with a world

class line-up of international speakers

who will be sharing their latest insights

on the homeland security environment.

Themed ‘Emerging Threats – The Case

for Collaborative Public Safety,’ the

three-day conference will expound on

how governments and private organisa-

tions can build an effective internal and

cross-border collaborative approach in

tackling emerging threats to homeland

security.

“In current times where the threats

are ever present, solutions to national

security have been evolving and devel-

oping in new ways. Public and private

collaborations are no longer an option

but a necessity,” commented Andrew

Marriott, Managing Director of Com-

exposium Singapore, “Through Milipol

Asia-Pacific 2017, we hope that at-

tendees will not only have abetter un-

derstanding of current key challenges,

but also familiarise themselves with the

roles that individuals can play in the ar-

eas of emergency preparedness, preven-

tion, and recovery.”

Through keynotes and interactive

panels, the insightful three-day con-

ference programme will include pres-

entations on three important areas of

ensuring national security, specifically,

Threats and Responses, Protection and

Emergency Management, and Innova-

tion in Tactics and Equipment.

SpeakerHighlights

Leading International industry ex-

perts from Southeast Asia, Eu-

rope, Middle East, and the US form the

line-up of conference speakers for the

upcoming Milipol Asia-Pacific 2017.

Together, they will be discussing on

emerging regional threats, as well as

the ways to mitigate, prevent and react

to them.

Notable speakers who were direct-

ly involved with the critical response

to recent emergencies caused by acts

of terrorism and conflict in countries

like France, Libya, Syria, Malaysia,

Indonesia, Philippines, Myanmar,

Pakistan, India and Bangladesh will

share their first-hand experiences, and

how in the face of emerging and fast

evolving threats, a complex landscape

makes it necessary for the community

to remain vigilant.

Day-1 Threats and Responses

Back at this year’s Milipol Asia-

Pacific 2017, international ter-

rorism expert, Dr Rohan Gunaratna,

Head of International Centre for Po-

litical Violence and Terrorism Research

(ICPVTR), and Professor of Secu-

rity Studies at S. Rajaratnam School

of International Studies (RSIS), and

Nanyang Technological University,

Singapore, will update delegates on

the current and emerging threats in the

Asia-Pacific region.

For the first time in Asia, hear from

the words of key people involved in the

Paris attacks as well as lessons learnt,

from speakers such as Chief Superin-

tendent Eric Gigou, Deputy Head of the

French Police Special Forces anti-ter-

rorism unit, and Chief Superintendent

Dimitri Kalinine, Central Commission-

er of the 3rd Arrondissement and head

of the Night Service Anti-Criminality

Brigade, Paris Prefecture of Police,

France.

Day-2ProtectionandEmergency Management

Learn the evolving roles and work-

ings of Counter-Terrorism Intelli-

gence in regional security from Datuk

Ayob Khan Bin Mydin Pitchay, Head

of the Royal Malaysia Police (PDRM)

counter-terrorism division.

Further anticipated highlights not

to be missed is the exclusive session by

James Le Mesurier, Director of the Syria

Civil Defence support programme. The

White Helmets as they are known are

credited with saving more than 80,000

lives amidst the ongoing crisis in Syria.

In addition to introducing the Develop-

ments in Civil Protection in Syria, he

will also be sharing some of his extraor-

dinary experiences on the ground since

2012.

Day-3 Innovation in Tactics andEquipment

Other panellists include, Director-

General Dr Rakesh Maria, who

will discuss the latest intelligence and

renowned Homeland security experts take the Stage at Milipol Asia-Pacific 2017 Conference

Page 31: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com29

InternatIonal Updates

with approaching mandates requiring

ECAC Standard 3-approved hold bag-

gage screening capabilities.

Powered by leading-edge Com-

puted Tomography (CT) technology,

Morpho Detection’s CTX family of

EDS are currently in-service around

the world.

Safran Identity & Security, through

its subsidiary Morpho Detection,

announced its CTX 9800 DSi™ ex-

plosives detection system (EDS) has

achieved Standard 3 endorsement from

the European Civil Aviation Conference

(ECAC) with a 0.5 meters per second

belt speed.

While maintaining the same foot-

print and ease of serviceability, CTX

9800 at 0.5 m/sec belt speed reduces

power consumption while improving

uptime, image archiving capability

and total bags per hour (BPH) capac-

ity. Leveraging

increased speed

and the crisp im-

age quality of

the Clarity Data

Acquisition Sys-

tem (DAS), CTX

9800 now reli-

ably screens up

to 1,800 BPH.

Combined with

the compact CTX

5800 and un-

matched global

service footprint,

Morpho Detec-

tion helps all-

sized airports en-

sure compliance

“Developingtheabilitytoscreenholdbaggagefaster,moreeffectivelyandwithsuperiorimagequalityisattheheartofMorphoDetection’scom-mitment to our customers formorethan 25 years. This approval fromECAC gives airports powerful newsecurity capabilities while furthervalidatingtheCTXplatformashav-ingthescalabilitytomeettherapidlygrowingroleairportsareplayingasglobalhubsforcommerce.”

– Moureen SchobertCTX Product Manager,

Morpho Detection

analytics involved in counter-terrorism

intelligence, and Deputy Inspector Gen-

eral (Chief) Monirul Islam from Bang-

ladesh.

In his first conference stage ap-

pearance in Southeast Asia, the man

behind the creation of Dhaka Metro-

politan Police’s special Counter-Ter-

rorism Unit will lead us through the

dark but real issue of the evolving ter-

rorist mindset.

With over 400 attendees from

more than 30 countries expected, the

region’s flagship homeland security

conference supported by the Minis-

try of Home Affairs, Singapore and

the Ministry of the Interior of France

is the premier event for all trade and

professional security practitioners to

attend.

Workshops

In addition to the highlights of the

main conference programme, there

will also be a series of events taking

place concurrently on site, as part of the

Milipol Asia-Pacific exhibition. This in-

cludes the Drone Asia 2017 conference

(5 April), Securex-Asia 2017 (5 & 6

April), and the IED Workshop 2017 (6

April).

Morpho detection’s ctX 9800 achieves ecac standard 3 endorsement at 0.5 Meters per second

Page 32: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com30

feature

AnalysisMobile credential downloadswilltriple● Approximately 4.5 million creden-

tials were estimated to have been

downloaded in 2016. IHS Markit

forecasts that this number will triple

to around 13.5 million in 2017.

● The reason for the strong growth is

two-fold:

o The market sentiment believes

that, as in other industries, mo-

bile credentials in access con-

trol is not only a strong value

proposition by itself, but mobile

credentials also have the ability

to unlock a more integrated and

better value system for the end

user while also allowing provid-

ers new avenues of services that

can support revenues streams go-

ing forward.

o In addition, mobile credentials

are not competing against the

traditional physical card at this

time and therefore have a poten-

tial market equal to that of smart

cards.

electronic access control iHs Markit predictions for 2017

By Jimmy Dearing – Analyst, IHS Markit

Electronic locks in emerging regions● Electronic lock growth in emerg-

ing countries globally will expand

by about 9 percent. Eastern Europe

and Africa will lead all other regions

with an estimated growth of 17 per-

cent for electronic locks in 2017.

New biometric technologies● Facial recognition will make further

strides towards establishing itself as

the second most popular type of bio-

metric reader.

● Although fingerprint remains the in-

dustry standard for biometrics, facial

recognition and iris recognition are

currently battling it out for the title

of the second most used type.

● IHS Markit forecasts an increasing

interest in facial recognition over

iris recognition. Iris recognition is

more accurate and better suited for

its niche role than facial recognition,

but facial recognition is easier to in-

stall and does not have (unfounded)

concerns for health.

● The market for facial recognition is

predicted to grow rapidly over the

next five years. Although it will not

overtake iris recognition in revenue or

shipments, it will have momentum.

Chinese manufacturers will gain share● Although China’s impact on access

control has been far less profound

compared to video surveillance, Chi-

na will begin to have more influence

on trends across APAC as well as the

global access control market begin-

ning in 2017, IHS Markit predicts.

● In China, new factories crop up seem-

ingly every month. Each new factory

is keen to establish itself in terms of

market share and, as a result, enters

with extremely competitive pricing.

● AliExpress and the increasing number

of English speaking freight-forwarding

companies in Guangdong will also

make it easier than ever for Western

distributors and integrators to acquire

products direct from these factories.

IP-enabledcontrollerswillexperiencedouble-digitgrowth● Global unit shipments of IP-enabled

access controllers will grow at double

the rate of other panel variants in 2017.

● The growth of the market for IP-

based panels reflects greater use of

web-based and online products.

● As access control systems move from

PC-based to mobile-based control

elements, the associated infrastruc-

ture will likely follow suit.

Highlights● Globallyin2017,theaccesscontrolmarketwillincreaseby6.8percent

andexceed$4.2billion.● Access control will continue to play a larger role in enterprise through

deeperintegrationswithvideosurveillance,businessprocessesandIoT.● Mobilecredentialsandbiometricswillbetwoofthetophardwaretrendsto

watchalongwithlogical/physicalintegrationsandremoteservicessuchasaccess-control-as-a-service(ACaaS).

Page 33: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com31

feature

what to watch for in the digital security Market in 2017

By Don Tait–SeniorAnalyst,IHSTechnology

As people slowly return to their

normal course of activity in 2017,

what is likely to happen in the digital

security market in the months ahead?

IHS Markit predicts the key themes

driving various digital security sectors

this year:

TopTrendsfor2017● India’s decision to scrap all 500 and

1000 rupee notes in November 2016

will transform the digital payments

landscape within the country.

● The embedded SIM (eSIM) market

will develop further in 2017 with

the launch of the eSIM in cellular

handsets. The eSIM will also be-

come more common in areas such as

M2M, wearables and consumer elec-

tronic devices.

● The terror attacks in Nice, Berlin and

Istanbul will bring eID credentials,

border controls and the Schengen

Agreement into sharper focus.

● The IOT space will prove to be a hot

bed of innovation over the next 12

months. NFC will play a pivotal role

in connecting these IOT devices.

Analysis for 2017Indiascrapping1000and500Rupeenotestransforming digital payments● India’s decision to scrap all 500 and

1000 rupee notes in November 2016

will transform digital payments

there. IHS Markit believes that this

decision will dramatically increase

the size of the mobile payments mar-

ket. The move was designed to curb

endemic corruption. But it also had

the effect of accelerating India’s tran-

sition to digital payments, and the

mobile wallet market is expected to

explode to 300 billion rupees ($4.5

billion) by 2022 from 1.5 billion

rupees in 2016. Companies such as

Paytm, Oxigen, MobiKwik and Pay-

UMoney are well placed to take ad-

vantage of this decision. It will also

increase the number of smart and

secure EMV credit and debit cards

in circulation and accelerate India’s

transition to digital payments.

Embedded SIM becoming more mainstream ● The embedded SIM (eSIM) market

will develop further in 2017 with the

launch of the eSIM in cellular hand-

sets. In 2017, growth of SIM card

shipments is projected to slow. The

SIM card market is relatively satu-

rated and the introduction of eSIM

cards will slow this market further.

On the plus side, companion de-

vices such as smart watches, which

incorporate an embedded SIM card,

are projected to benefit SIM card

shipments over the next few years.

There are also other markets such as

automotive, consumer electronics,

M2M and IoT that can benefit from

an eSIM, where its use will become

more common.

● The eSIM can have benefits for dif-

ferent stakeholders of the ecosys-

tem. For consumers it can lead to

lower costs of connected products,

an increase in the number of con-

nected devices and an improved

customer experience and greater

flexibility. For MNO’s, the eSIM

can lead to new market opportuni-

ties in areas such as M2M, IoT and

the connected car. It can also lead to

the reduction in SIM handling, inte-

gration and handling costs. For SIM

card suppliers, there is also the op-

portunity to enter new markets such

as IoT, M2M and the connected car.

A reduction in physical costs is ex-

pected as well.

Electronic identity (eID) credentials on the increase?● The terror attacks in Nice, Berlin and

Istanbul in 2016 have brought eID

credentials, border controls and the

Schengen Agreement into sharper

focus. The Schengen area is com-

posed of 26 European countries with

a common visa policy that have of-

ficially abolished passport and other

types of border control for interna-

tional travel within the area. Some

people have questioned whether or

not Schengen in now fit for purpose

or relevant to today’s circumstances:

o Does the Schengen area need to

tighten its border controls or even

be scrapped?

Page 34: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com32

feature

o Do individual countries with-

in the Schengen area need to

strengthen their border controls?

o Do governments need to issue

more secure eID credentials to

their citizens?

● IHS Markit believes that the Schen-

gen agreement will not be scrapped

in 2017. The free movement of goods

and people is one of the core values

of the European Union. However, it

does need to evolve. The ongoing mi-

gration crisis and terror attacks have

resulted in some countries such as

Austria, Denmark, Norway, Poland

and Sweden imposing temporary

controls on some or all their borders

with other Schengen countries. This

includes the re-introduction of show-

ing passports and border checks.

● IHS Markit believes that individual

countries may unilaterally impose

border controls on other Schengen

countries in 2017. This could lead

to an increase in demand for border

control equipment and more secure

eID credentials. This would require

government budgets to increase in

order to absorb the costs of these

higher security measures. Also, there

has already been strengthening of the

outer borders of the Schengen area in

countries such as Greece.

IOT devices will be a hot bed of innovation ● The internet of things (IoT) will prove

to be a hotbed of innovation over the

next twelve months. IHS Markit be-

lieves that Near Field Communica-

tion (NFC) will play a pivotal role in

connecting the installed base of 31

billion IOT devices that are projected

to be in use by 2020.

● The connectivity of the IoT will en-

able the seamless communication

among devices. NFC can be used to

help developers utilise internet-ena-

bled devices in an effort to maximize

the benefits of the IoT in daily life.

● NFC provides a simple solution for

connecting IoT devices to a network.

Any device that is lacking a qual-

ity user interface (UI) can be given

user-friendly controls with a single

tap via NFC. In addition to its ease

of use, other benefits include explicit

interaction through close proximity

interactions, read and write capabili-

ties and communication with devices

that are powered down. NFC is a low

cost and low energy solution that

will enhance the IoT experience.

The Refinement of Smart Home at ces 2017

By BlakeKozak–PrincipalAnalyst,SmartHomeandSecurityTechnology,IHSMarkit

AnalysisCameras take center stage● For cameras, the smart home focus at

CES was around facial recognition,

360 degree viewing, security motion

detection and HomeKit (the D-Link

Omna camera).

● Outdoor cameras were featured as

well, with announcements from Bosch

and Ring, each of which had outdoor

cameras connected to outdoor power

sources and integrated with lighting.

Baby monitors were also a trending

item, with NetgearArlo and OneLink

by First Alert, each of which have

advanced features such as air quality

monitoring but the OneLink camera

offers video respiration detection, a

feature that uses non-invasive meth-

ods to monitor a baby’s breathing.

● Overall, the smart home camera mar-

ket continues to expand as suppliers

enhance their portfolio with cameras

designed for various purposes such as

outdoors, indoors, wired, wireless and

cameras with lower price-points. A

few new cameras that were announced

combine several connectivity stand-

ards and automation features into

one device (including voice control),

such as the Somfy One and SmartBe-

ingsWoohoo, which will likely look to

challenge Canary and Piper.

Illumination on bulbs and sensors● Light bulbs such as Lifx provide two

types of illumination, one of which is

infrared to assist with outdoor cam-

eras using night vision. The infra-

red helps the cameras see clearer in

complete darkness, which for battery

Page 35: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com33

feature

powered cameras, will dramatically

increase battery life. Other light bulb

announcements featured integrated

motion detection and speakers.

● Environmental sensors were also

more pervasive this year at CES.

Devices with embedded tempera-

ture and humidity sensors have been

common place for many years but

there has been a spike in devices with

embedded air quality sensors (VOC

detection). This has also led to an in-

crease in the number of air purifiers,

ranging from portable and stationary

to robots which move through the

home detecting air quality levels, pu-

rifying the air on-demand.

● IHS Markit believes the market for

environmental sensors, especially air

quality sensors monitoring allergens

and pollutants as well as ultraviolet

(UV) will become commonplace in

smart home devices.

Changing business models andmakingthingssimple● In addition to device refinement, busi-

ness models are also changing at

CES. Many of the top service provid-

ers offering smart home have focused

on manufacturing their own devices

in order to create a seamless look and

feel across devices. Although partner-

ships will still hold great importance,

service providers are looking to build

up their own device portfolio and de-

velop proprietary back-end software

and artificial intelligence (AI).

o Two examples of providers tak-

ing this route include Vivint and

Comcast – each of which started

off their smart home venture by of-

fering a mix and match of device

types and device brands – however

each now has its own devices and

backend. Moreover, Vivint an-

nounced its intelligent Sky plat-

form will rely on AI to automate

the home. The consumer simply

answers questions from the system

while it learns behaviors. Alarm.

com announced a similar offering

with its Insights Engine.

● Meanwhile, Comcast continues

to work toward owning the home

through entertainment, recently en-

hancing its voice controlled remote

to allow controlling of lights and

other automatons. Not to be outdone,

ADT announced a partnership with

Amazon which permits users of ADT

Pulse to arm and disarm the security

system through voice control. What

makes this announcement unique is

that the user arms and disarms the

system by telling Alexa a PIN num-

ber. This is significant because there

have been reports of security systems

being armed and disarmed from out-

side the home. This new partnership

provides an additional layer of secu-

rity, which is timed well with the re-

cent IoT security vulnerability news.

● Simplifying smart home was also a

trend. Sigma Designs announced

SmartStart and Comcast is partner-

ing with Cirrent (ZipKey) to provide

quick and easy connection of IoT

devices. IHS believes making smart

home easier to install for the con-

sumer (do-it-yourselfers) as well as

professional installers will remove

one of the biggest barriers to mass

smart home adoption.

● Lastly, voice assistants could be found

at nearly every smart home booth at

CES this year. IHS Markit believes

that voice assistants will become

the new user interface for the smart

home, but the mobile device will con-

tinue to have its place when managing

settings and advanced features.

A maturing market● Overall, there were more than 190 ex-

hibitors with a smart home offering

at CES 2017. Despite this fragmenta-

tion, it is clear the smart home market

is finding maturity in North America.

Suppliers and service providers are

making strides to enrich devices and

the platforms with features consumers

find valuable and can easily install.

● Moreover, industry players are look-

ing to bring the technology and expe-

rience to the consumer through new

channels, such as electronics retail-

ers (Best Buy in partnership with

Vivint), hotels (Wynn in partnership

with Amazon), insurance, utilities,

builders/ real estate (KB Home Cald-

well Banker) and rentals (Airbnb in

partnership with Vivint and August

Lock). As smart home is pushed to

the consumer from all sides, aware-

ness will grow and prices will fall

with one of final hurdles being con-

sumer imagination.

Highlights● Fragmentationof thesmarthome

marketprovedtobeakeythemeat Consumer Electronics Show.Actuallyadifferentmessage–re-finementof themarket–becameapparentduringtheshow.

● Smart home announcementsweren’t just about cameras orlight bulbs. The announcementsfocusedontheconsumeranden-riching the consumer experiencethroughseamlessintegrationsandfeature-richofferings thatcanap-pealtoadiverserangeofneeds.

● Globallyin2016,thereweremorethan80millionshipmentsofsmarthome devices with an installedbase that exceeded 190 milliondevices.

Page 36: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com34

application/ case study

In the last two decades, global eco-

nomic growth has led to tremendous

increase of vehicles in almost every cor-

ner of the world. Reports show that in

cities, most high rise apartment build-

ings have difficulties managing their

parking spaces. ID card issuing, billing,

entrance control and payments can make

the entrance procedure very inefficient.

Traditional smart card management sys-

tem limits the access to those who hold

an allocated smart card. However, cards

could be stolen and the processing of a

lost card can be painful.

With an abundance of experience

in video surveillance, Dahua launches

a new comprehensive and intelligent

car park solution. Dahua Smart Car

Park Solution is based upon video sur-

veillance and video analysis technolo-

gies. Moreover, it is integrated with the

background smart analysis system DH-

DSS4004-EMS. Entrance control with

Dahua Smart Car Park Solution saves

labor cost and is more convenient and

safe.

Dahua Smart Car Park Solution’s

entrance control function is designed

with 4 essential aspects:

● DigitalentrancecontrolviaANPR

camera: Efficiency is largely en-

hanced using ANPR technology.

Authorized vehicles will be identi-

fied by ANPR camera, which reads

car license plates and controls the

gate. For visitors, simply press the

VTT201 video intercom button and

talk to the operator.

● Real-time entrance surveillance

through fast and accurate license

plate recognition: ANPR cameras

ITC237-PU1A-IRHL have a rec-

ognition rate higher than 95%, and

covers all license plate of European

countries. No loop in the system sim-

plifies the installation.

● Fuzzy search of all European car

platesvia4KNVRcamera:Dahua

NVR5208-8P-4KS2 supports 4K

ultra HD resolution (3840x2160) re-

cording, live-viewing and playback.

If you use refine search function, in-

formation including vehicle image,

license plate number, entry & exit

history log, and recorded video will

be displayed in the window. NVR

also supports export of license plate

data strings with exact date, time and

channel to USB memory.

● Smart management via DH-

DSS4004-EMSsystem:Based upon

windows management software,

entrance control with dahua smart car park solution

application/ case study

Page 37: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com35

application/ case study

background smart analysis system

DH-DSS4004-EMS is specially de-

signed for a management center.

It is cross-functional, easy to use,

and cost effective. The management

center can respond to an emergency

call from the VTT201 video inter-

com, and support search of video

and image by date/ time/ license

plate number from the storage.

Using an advanced technology

(ITC237 ANPR cameras, NVR5208-

8P-4KS2 4K NVR, DH-DSS4004-

EMS smart analysis system etc.),

Entrance Control Function of Dahua

Smart Car Park solution delivers high

efficiency and safe entry into the resi-

dential compound. In addition, this

solution is scalable to expand with

compound infrastructure growth and is

flexible to upgrade with technological

change. More useful functions of will

be added to Dahua Smart Car Park So-

lution soon.

Peel Ports Great Yarmouth is a

modern, multi-purpose port,

based in Norfolk, UK. The port in-

tegrates a new, deep-water outer

harbor, as well as a well-established

river port. With Peel Ports Great Yar-

mouth being a major hub into the

East Anglia mainland, any disruptive

event can have a massive impact on

operations and the flow of movement

within the region. The port operators,

therefore, decided to have a compre-

hensive security monitoring solution

in place in order to safeguard cargo,

infrastructure and people. Using

FLIR’s network-based Video Man-

agement Solution (VMS), the port is

certain to be able to meet the needs

of today’s demands, as well as tomor-

row’s business growth.

Peel Ports Great Yarmouth is stra-

tegically located to serve the Oil and

Gas fields of the southern North Sea

and the existing and planned Offshore

Wind development off the UK East

Coast, and offers the shortest North

Sea crossing between Great Britain

peel ports great Yarmouth opts for future-proof Video surveillance over ip

FLIr’s Latitude VMs efficiently supports Peel Ports in its current and future security needs

and continental Europe. The port has a

long tradition as a general and project

cargo port handling a wide range of

cargoes, including aggregates, cement,

grain, fertilizers, forest products, dry

and liquid bulks, pipeline and onshore

wind farm equipment.

Enhanceportsecurity

The port authorities needed a sur-

veillance monitoring solution for

both the old and new Peel Port areas for

the protection of vulnerable areas such

as entries, exits, jetty areas, storage lo-

cations, loading and unloading areas.

They also wanted to efficiently monitor

the waterways for quick and effective

response times in case of emergency

situations. Another challenge was to

leverage the existing network infra-

structure for integration with the port’s

current analog cameras. All camera

video streams needed to be fed into a

central control room, and further scal-

ing of the camera network within the

town of Great Yarmouth needed to be

possible.

Future-proofvideosurveillance over IP

Peel Ports Great Yarmouth turned to

Check Your Security Ltd., a Nor-

folk-based IP security systems integra-

tor, for the integration of a comprehen-

sive video surveillance system.

Check Your Security offers its cus-

tomers many types of security solutions,

based on discussions and a site survey

to ensure that customers have a flexible

and scalable solution that not only meet

today’s goals, but also can expand as and

when required.

The company opted for FLIR's Lati-

tude VMS, which provides forensic qual-

ity imaging and user-friendly operation

consisting of dedicated, web-based and

mobile client software. The video sur-

veillance solution also includes a wide

range of hardware components, includ-

ing FLIR’s Quasar Quad HD cameras

and older analog cameras coupled with

video encoders from FLIR, offering Peel

Ports many options to efficiently secure

the harbor area.

“The task Check Your Security

Page 38: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com36

application/ case study

faced was to provide a fully integrated

and comprehensive video surveillance

system in a coastal port environment

that is both harsh and demanding,” said

Richard Musgrove, Harbor Master at

Peel Ports Great Yarmouth, “Check Your

Security offered a solution that met our

challenging operational requirements,

resulting in Peel Ports Great Yarmouth

managing a robust, reliable and scalable

system for today and for the harbor’s fu-

ture growth.”

FLIR’s Latitude VMS

Peel Ports is relying on Latitude,

a powerful and versatile network

based Video Management System

(VMS), designed for organizations of

all sizes. FLIR Latitude allows Peel

Port's control room operators to view,

playback, search and export their video

streams.

Quasar Quad HD imaging

The FLIR Quasar camera line includes

Quad HD resolution and WDR bul-

let cameras that represent an image qual-

ity breakthrough by combining advanced

shutter technology with high megapixel

count. This results in evidentiary-class

video quality in the toughest lighting

conditions. These advanced Quasar mod-

els offer 76 percent more detail than

HD1080, and the same forensic zoom as

legacy 5MP cameras. Utilizing its broad-

cast, motion-processing based architec-

ture, the Quasar Quad HD camera series

delivers predictable storage, lower utility

costs and a reduction in the Total Cost of

Ownership (TCO).

Increased safety in the harbor

With the installation of the FLIR

Latitude VMS and camera sys-

tems, the safety for the staff and the

general public, as well as the operational

efficiency of the harbor, has significantly

improved. The camera systems include

both visual and thermal imaging tech-

nologies, guaranteeing detection in any

environment during all operation times.

Check Your Security was able to lever-

age the existing network infrastructure

through a wireless mesh and a fiber

backbone. The newly deployed system

features centralized processing, with a

flexible and scalable architecture, allow-

ing Peel Ports Great Yarmouth to ensure

24/7 security of the port, even in remote

areas, such as the Old Bridge and Outer

Harbor.

Futureplans

Matt Jones, UK Area Manager at

FLIR Systems, commented on

the installation, “Check Your Security

have utilized many of FLIR’s end-to-

end IP Solutions to enable the highest

level of security and the quickest emer-

gency response times with the technol-

ogy available, allowing Peel Ports to en-

sure there are no operational restrictions

for a seamless transition towards a safer

future. Looking ahead, as Peel Ports con-

tinues to grow and develop as a leader in

its field, Check Your Security and FLIR

Systems will be able to deliver and de-

velop new solutions for a safer, diverse

digital future.”

uniview protected Hilton Hotels and resorts in uae

Uniview provides video surveillance

solutions for three Hilton hotels

and resorts in UAE which are Hilton

Hotel and Spa Resort RAK, Hilton Al

Hamra Beach & Golf Resort, and Hilton

Residence and Village.

Hilton resort and Spa in Ras al

Khaimah is located on the city’s north

side, in the Al Maareedh area. The mul-

ti-award winning resort provides a lei-

surely pace of living, sprawled over 1.5

kilometers of private white sandy beach,

offering the perfect destination for a

family getaway. Hilton Residence and

Village is 5 minutes’ walk from Hilton

resort and Spa in Ras. Hilton Al Hamra

Beach & Golf Resort is an eco-friendly

hotel located in Al Jazirah Al Hamra

area Ras al Khaimah.

Solution

Uniview provided whole video sur-

veillance solution for Hilton Ho-

tel and Spa Resort RAK and back-end

Page 39: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com37

application/ case study

products for the other two hotels.

In Hilton Hotel and Spa Resort

RAK, more than 300 IP cameras are

installed not only in public areas like

all public entrances and exits, lobbies

and reception, vehicle entry and exit,

parking area, elevator and staircase,

emergency exit but also staff working

areas including water tanks, electri-

cal rooms, gas cylinder areas, kitch-

ens, safe, store, archiving and control

rooms.

In Hilton Al Hamra Beach & Golf

Resort and Hilton Residence and Vil-

lage, NVR516 and disk enclosures are

used to connect and manage Axis cam-

eras, storing videos days and nights.

HighlightsAll-weatheradoptedvideosurveillance: corridor mode, WDR, anti-corrosion

Corridor mode is supported on Uni-

view cameras and highly appropri-

ate for hallway monitor application in

hotels. Using 9:16 vertically oriented

video stream to increase 40% of valu-

able coverage in longitudinal areas such

as corridors or hallways.

In the lobby of the hotel, glass doors

are always the bright background in the

image. Uniview true WDR cameras pro-

vide clear image in this scene.

To consider the Hilton hotel is lo-

cated next to the seashore, Uniview ap-

plies anti-corrosion painting powder and

surface treatment on cameras, which are

also all-weather adopted and can work in

high temperature and humidity.

High level data safety: RAID NVR

In order to keep the system working

with highest safety level, NVR516

provides redundant power supply in

case of electricity failure. For data stor-

age, NVR516 provides different redun-

dant arrays of independent disks like

RAID 0, 1, 5, 6, 10. Even if one of the

HDD is broken by chance, the NVR can

prevent data going missing and rebuild

RAID in a short time.

High density mass data storage: 90 days 7/24 uninterruptedstorage

Built-in 16 SATA interfaces and two

mini SAS interfaces for additional

disk enclosures, NVR516 provides 7x24

hours, 90 days uninterrupted recording

of hundreds of cameras. Such a mass

storage makes it possible and convenient

to search video and events that occurred

a long time ago.

Managementability:upto500 cameras connection

NVR516 supports 128 cameras in-

put and storage for single NVR.

One hotel deploying 4 NVR516 can

easily manage up to 500 cameras cov-

ering all the areas including reception,

lobby, restaurant, square, garden etc.

Guards in the control center watch live

view and get each public corner under

monitoring. Any event or alarm can be

received on occurrence.

As the world’s leading video sur-

veillance solution provider, Uniview

is covering more and more industries

including world-class hotels, shopping

malls, city surveillance, banks, hos-

pitals, educational facilities, factories

etc.

Page 40: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com38

application/ case study

Fluid Management Technology

(FMT), based in Adelaide, South

Australia, has developed a high-tech

system that allows companies to remote-

ly monitor gasoline consumption.

The devices, which are being used

in more than 10 countries, are designed

for fleets of mining, transport, civil con-

struction and municipal vehicles that

regularly undertake long trips.

FMT’s SmartFill GEN2 devices use

driver and vehicle specific identification

keys to unlock the fuel tank. The device

then records how much fuel is put into

the vehicle’s tank. It also accesses the

vehicles odometer readings and cargo

types to calculate fuel requirements.

FMT Managing Director Bob

Thomas said the system, which was fit-

ted to bowsers at fuelling stations, could

be programmed to lock fuel tanks if too

much fuel or if an unscheduled transac-

tion occurred.

“Depending on the key used, things

like odometer statistics, the amount

of fuel used, the name of driver and

other data are sent to a client’s web-

based account where they can track

movement in real-time,” he said.

“In places like the UAE, In-

donesia and Papua New Guinea,

people are buying our products be-

cause of fuel theft, which could in-

crease depending on the fuel prices

there.

“The ultimate solution is that every

key is registered, so if a driver is in-

volved then they will get pulled up but

we are working on additional features to

create a more comprehensive process.”

FMT’s success grew with the imple-

mentation of a diesel fuel rebate in Aus-

tralia, which allowed businesses to claim

exemptions or rebates on fuel excise tax.

The SmartFill allowed businesses to

accurately document fuel consumption

to maximise tax credits.

It has since expanded internationally

to include clients in Indonesia, United

States, Vietnam, New Zealand, Kenya,

New Caledonia, Mongolia and Oman.

Last year it began selling the devices

to the United States Government for use

at its embassy in Nepal and is set to in-

stall another system at its Guatemalan

embassy in the coming months.

FMT has also set up its first US oper-

ational base in Michigan to help service

North America and provide full-time as-

sistance to customers in the region.

Thomas said because of the 14-hour

time difference between North America

and Australia, it meant there was almost

always an FMT employee available to

assist customers.

“We are really focused on increas-

ing our exports and are hoping our move

into the US continues to expand quite

quickly,” he said, “Our products are a

step above the rest and only require a

fifth of the time to install.”

Thomas said the company was now

working on a new nozzle-based identi-

fier that would lock down the tank if it

did not recognise the vehicle taking on

fuel.

internet of things puts Brakes on fuel theft

An Australian manufacturer is using the Internet of things to tackle fuel theft across the globe

Page 41: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com39

application/ case study

Network visualization expert Bar-

co’s OpSpace operator workspace

solution make inroads in control rooms

around the world. Since October, op-

erators at the new operations control

center of German IT services provider

Finanz Informatik have been experi-

encing how OpSpace helps them work

more comfortably and more effectively

german it services provider chooses Barco’s opspace

and take better decisions faster. In ad-

dition to the 28 units installed at the

Finanz Informatik facility in Germany,

OpSpace is currently being rolled out

at control rooms of other companies in

EMEA, the US, Brazil and APAC coun-

tries.

Finanz Informatik provides pro-

fessional IT services to clients in the

financial sector. Besides offering con-

sultancy and implementation, the com-

pany also increasingly offers Software

as a Service (SaaS) – a service which

includes monitoring the performance

of applications and ensuring their

availability and hence the investment

in a new OCC. “As our operators have

to monitor increasingly complex sys-

To Raise Comfort and Efficiency at its New Control Rooms

3UK, one of the UK’s top mobile

operators, serves 500K subscribers

with Wi-Fi in the London Underground

using Wi-Fi service management solu-

tions from Aptilo Networks.

3UK has experienced significant

month-on-month growth of the service

since first deployed in 2014, with a high

percentage of recurring users, helping

3UK to increase its value to subscrib-

ers and reduce churn especially among

commuters.

3UK, which had no Wi-Fi capabili-

ties prior to the launch, built its Wi-Fi

service from the ground-up using the

Aptilo Managed Service™ through an

existing Wi-Fi access network deployed

across the London Underground by Vir-

gin Media. Mobile users in the Under-

ground stations can register for service

using a customized web portal inte-

grated with 3UK’s my3 customer care

portal. Once registered, the Aptilo Wi-Fi

service management solution remem-

bers users and provides returning users

with a seamless, automatic login.

The operator is using a high-capac-

ity Wi-Fi network to bridge the gap be-

tween 3UK’s leading 4G network and

metro stations where mobile coverage

can be difficult to obtain.

“For 3UK this is a clear win-win;

they reduce costs by deploying through

a third-party network and can provide a

Wi-Fi service which is fully integrated

with existing mobile data services,” said

Frédéric Servat, Regional Account Di-

rector, EMEA, Aptilo Networks.

Aptilo Networks is a leading pro-

vider of carrier-class systems to man-

age data services with advanced func-

tions for authentication, policy control

and charging. Aptilo Service Manage-

ment Platform™ (SMP) has become

synonymous with Wi-Fi service man-

agement and Wi-Fi offload in large-

scale deployments with 100+ opera-

tors in more than 70 countries, and is

a critical component of Wi-Fi calling

and IoT.

Wavesight is a UK based leader in

the design, manufacture and supply of

outdoor wireless network, hybrid energy

and mobile surveillance solutions for the

professional security industry.

Aptilo Enables Wi-Fi for Half a Million 3UK subscribers in the london underground

Page 42: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com40

application/ case study

A recently opened shopping centre in

Bradford, West Yorkshire, is now

benefitting from an innovative range of

intelligent life safety systems from Ho-

chiki Europe.

The Broadway Shopping Centre,

a large mall in the centre of Bradford

operated by Westfield Corporation, was

opened to the public in November 2015

and currently contains 77 restaurants,

cafes and shops.

As a large retail space containing

more than 570,000 square feet, The

Broadway required a complex multi-

networked fire detection system which

could be quickly and easily accessed

from a number of locations across the

The Broadway Shopping Centre Benefits from intelligent life-safety system

premises. Due to the large number of

stores and thousands of daily visitors,

it was also vitally important for the sys-

tem to be addressable so that the exact

whereabouts of an incident would be

known as soon as possible.

Bradford-based electrical contrac-

tors, Pitts Wilson, were brought in by

Westfield Corporation to specify the

most effective solutions for the project.

The group chose to install an intelligent

fire alarm range produced by leading life

safety system manufacturer, Hochiki

Europe.

As part of the project, worth around

£50,000, more than 1,400 Hochiki Eu-

rope ESP devices were installed across

The Broadway Shopping Centre. This

included 280 optical smoke sensors, 150

wall sounder beacons, 40 base sounder

beacons and more than 100 call points.

Hochiki Europe’s EN 54-23 compliant

Visual Alarm Devices (VADs) were also

installed. The products were manufac-

tured to perform in line with recently

introduced guidelines which set stricter

guidelines on the installation and perfor-

mance of VADs in the UK.

VADs provide a visual indication

of an emergency, in the form of a bright

flashing light, which helps alert peo-

ple who wouldn’t normally pick up on

audible-based fire alarms. In large retail

spaces, this can prove vital for shoppers

tems and budgets are tight, efficiency

really was a key criterion when de-

signing our new control rooms,” said

Mathias Meyer, Project Manager, “As

were ergonomics, collaboration and

OT/IT integration. Barco’s OpSpace

was the perfect match.”

Singlepixelspaceforviewing and control

Launched in 2016, Barco’s OpSpace

is a personal workspace experi-

ence that provides operators with a

single pixel space for viewing, moni-

toring and interacting with a myriad of

remote systems. Operators simply use

one mouse and keyboard to control all

applications, experiencing a complete

overview of the situation from the com-

fort of a single chair. This creates a very

flexible approach to the operator’s job

− allowing better situational overview,

and therefore better decision-making

“We discovered Barco’s OpSpace

and were really impressed,” Ulrich

Reichelt, Control Center Department

Manager recalls, “The innovative tech-

nology as well as its future-proof and

scalable system architecture, which

even integrates with video walls in

their main control rooms, won us over.”

Finanz Informatik equipped 28 work-

places with the OpSpace solution, mak-

ing it easier for operators to manage the

337,000 computers, 24,000 cash points

and 27,000 servers of the 403 saving

banks that need monitoring.

Work more focused, more comfortably and

more intuitively

The installation at Finanz Informa-

tik is the first big install in Germa-

ny. Barco is setting up similar personal

workspaces at control rooms in EMEA,

US, Brazil and APAC.

“Barco developed OpSpace to

make life easier for control room op-

erators and help them raise their pro-

ductivity. The enthusiastic feedback of

OpSpace proves that OpSpace meets

a real market need,” comments Dirk

Hendrickx, VP Operational Collabora-

tion Systems for Barco, “We are excit-

ed to share OpSpace to streamline the

busy workday of control room opera-

tors at Finanz Informatik and all our

other new customers, allowing them to

work in a more focused, comfortable

and intuitive way.”

Page 43: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com41

application/ case study

To build a comprehensive IP surveil-

lance system for the largest chain

in the convenience retailing industry –

7-Eleven, which opened it’s first store

in the United Arab Emirates in 2015 –

Brickcom’s IP cameras made all the dif-

ference.

7-Eleven, Inc., is one of the well-

known companies in retail. The new

2,000-square-foot store carries over

2,500 products which required a reliable

surveillance system to secure the facil-

ity. Therefore, the integrated security

solution is helping security managers

respond adequately by facilitating the

process of managing multiple staffs and

customers at the same time as manag-

ing shrinkage and theft from outside and

within.

Brickcom’s VD-300Ne and OB-

300Ne IP cameras cooperate with DI-

GIEVER’s central management sys-

tem and NVRs to maximize 7-Eleven’s

ESP range is manufactured to the high-

est international standards, giving users

freedom of choice without compromis-

ing on security.”

who are deaf, hard-of-hearing or wear-

ing headphones.

The 1,400 detectors were interfaced

with the shopping centre’s building man-

agement system using a range of Hochi-

ki Europe’s input and output modules,

which monitor for fire and fault through-

out the premises.

Mark Ellse, fire design engineer at

Pitts Wilson commented, “We chose Ho-

chiki Europe’s innovative range of de-

vices due to their smooth integration with

Advanced electronics panels and graph-

ics software. The plant control modules

also gave us more flexibility

when programming the cause

and effect logic. Aestheti-

cally, the devices fit in very

well with the look of the new

centre.”

Mark Smith, Hochiki

Europe’s UK Sales Manager

said, “The Broadway Shop-

ping Centre in Bradford

breathed new life into the city and now

shoppers can be reassured that it is pro-

tected by state of-the-art life safety tech-

nology. Our intelligent and expandable

benefit. Meanwhile, customers can be

ensured of their personal safety during

shopping at the store, as well.

Brickcom’s VD-300Ne and OB-

300Ne IP cameras are installed on the

store’s ceiling to provide high-quality

overall security. The cameras’ functional

design enabled the retail surveillance

system to be installed quickly with-

out damaging the store’s interior decor.

With wide angle lenses, it ensures zero

dead spot during monitoring to reduce

possibility of vandalism and theft. VD-

300Ne and OB-300Ne IP cameras uti-

lize H.264 compression and Brickcom

i-Mode function, which reduces the bit

ratio compared with other video stand-

ards, and enables better and smoother

video images to be transmitted over the

network. Moreover, equipped with IP67

and IK10 outdoor enclosure, incidents

of vandalism were significantly reduced.

Now Dubai’s first 7-Eleven has been

able to improve the employees’ sense

of safety, as well as enhance their ser-

vice attitude and professionalism, while

meeting the management’s demands for

retail monitoring.

Brickcom security solution for 7-eleven stores in dubai

Page 44: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com42

application/ case study

nemours children’s Health system selectsHid global solution for electronic

prescriptions of controlled substances to enhance their patient experience

HID Global® has deployed a Drug

Enforcement Agency (DEA)-

compliant and government certified

solution for Electronic Prescriptions

of Controlled Substances (EPCS) at

Nemours Health System. The solution

easily integrates with the Nemours’

Epic Electronic Health Records (EHR)

system to automate their paper-based

prescription system and provide an en-

hanced patience experience. In addi-

tion to increasing overall productivity,

the new system makes pharmacy visits

faster and more convenient for patients

by eliminating the need to obtain paper-

based prescriptions and reducing wait

times.

According to a study by NASS-

COM, the Indian healthcare IT market

is valued at $1billion (about Rs 6,650

crore) and is likely to grow about 1.5

times by 2020. With increasing cus-

tomer adoption, privatization of health-

care and rapid growth of technologies

like predictive analytics and cloud, In-

dia poses tremendous opportunities for

the healthcare IT market. HID Global

has also announced that the solution is

available in India.

Nemours’ previous manual process

was extremely inconvenient for pre-

scribing physicians and they could not

issue prescriptions to patients during

Telemedicine sessions – an otherwise

efficient and real-time means for deliv-

ery of care. “Our mission is to be the

guardians of children’s health and joy,

which also extends to being the guard-

ians of their health information,” said

Bernie Rice, Chief Information Officer

with Nemours Children’s Health Sys-

tem, “To fulfil our mission, we needed

an e-prescribing solution that would en-

able us to provide the exact care our pa-

tients need, when and where they need

it, and that minimized impact on home

and work life while providing all neces-

sary protections for personal data.”

The new HID Global solution pro-

vides the convenience for the prescribing

physician to choose the authentication

mode that best fit his or her workflow

in a given scenario. It empowers Ne-

mours to attach a digital certificate of

ID authentication to a FIPS 140.2 cer-

tified credential, using IdenTrust as the

Certificate Authority for each authorized

prescriber. The HID Global credentials

also include one-time password (OTP)

functionality that allows EPCS authenti-

cation using an OTP, without the need of

a desktop reader.

“HID Global’s vast portfolio of se-

cure identity solutions made it possible

for us to deliver a highly customized

system that addresses Nemours unique

requirements,” said Sheila Loy with

HID Global, “Our goal is to leverage

our comprehensive offering to help or-

ganizations improve their users’ overall

experience while increasing security at

the same time. The new Nemours sys-

tem is a positive reflection of how an

organization can accomplish these twin

objectives using HID Global solutions.”

Nemours Children’s Health System

has reported significant improvements

in their prescribing physicians’ experi-

ence, where they can now quickly and

simply authenticate to write online nar-

cotic prescriptions, in full compliance,

from the hospital, a clinic, other work

locations and from home. The hospital

noted the solution is cost-effective and

easy to support by their IT department

and medical assistants are saving time

in managing requests. Prescriptions can

now be digitally monitored and tracked

to eliminate paper and storage costs,

and they can be sent for fulfilment

prior to patients’ arrival. Investigations

that were previously more difficult and

time-consuming are also faster and

more streamlined with digital docu-

mentation of all prescriptions.

“We are seeing extremely rapid

adoption rates for our new e-prescrib-

ing system, and overwhelmingly posi-

tive feedback since its roll-out,” said

Dr. David West, medical director for

Nemours Health Informatics and the

physician champion for the EPCS pro-

ject, “Based on of the early success

the deployment, we are now exploring

how to leverage the HID Global EPCS

architecture for other valuable capa-

bilities, such as authenticating to VPNs

and enabling remote access using cre-

dentials, key fobs, mobile smartphones,

and other smart devices and one-time

password tokens.”

Page 45: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com43

application/ case study

Broadband tools strengthen rose parade security

Los Angeles regional Interoperable communications system and Motorola solutions deploy broadband infrastructure, software and devices to protect rose Parade

Motorola Solutions joined law

enforcement, fire and emer-

gency response personnel in using

the Los Angeles Regional Interoper-

able Communications System’s (LA-

RICS) private 4G broadband network

during the 2017 Tournament of Roses

Parade, adding new communications

capabilities and elevating situational

awareness for first responders.

Motorola Solutions built the net-

work for LA-RICS, and it remains

the largest U.S. broadband network

dedicated for public safety. During

the parade the network provided the

latest long term evolution (LTE)-em-

powered tools for many of the 1,500

responders who protected more than

750,000 onlookers in Pasadena, Cali-

fornia, spread over a 5.5-mile parade

route.

Building on last year’s success-

ful broadband demonstration during

the parade, LA-RICS and Motorola

Solutions deployed a wide range of

technology for this year’s parade.

High-definition camera feeds, broad-

band-equipped handheld devices and

software applications worked to-

gether to enable improved information

sharing and communication through

voice, data, pictures and video.

“Protecting this parade brought

together public safety agencies from

around the Los Angeles County re-

gion, and our broadband network pro-

vided a strong backbone to let them

do their jobs even more effectively,”

said John Radeleff, interim executive

director, LA-RICS, “This deployment

helped public safety teams stay in

touch no matter what type of radio or

device they used, helped the command

center staff keep close track of re-

sources and personnel, and ultimately

kept the parade-watching public safer

than ever before.”

Motorola Solutions supported

LA-RICS, the Los Angeles County

Sheriff ’s Department and Los Angeles

County Fire Department along with

other local and federal law enforce-

ment and public safety agencies that

jointly deployed to protect one of the

region’s largest public events. LA-

RICS noted the successful deployment

in its own news release.

Participants used Motorola Solu-

tions APX™-series radios on an AS-

TRO® 25 land mobile radio (LMR)

network along with the broadband

functions of LA-RICS to establish

interoperable communications and

seamless data sharing. Public safety

responders also used Motorola Solu-

tions’ LEX L10 Mission Critical LTE

Handheld devices, VML 750 trunk-

mount modems and a variety of soft-

ware tools on the network to enhance

situational awareness at the parade.

Deputies and officers on the pa-

rade route communicated quickly and

clearly in specific talkgroups using

WAVE™ 5000 Work Group Commu-

nications software that seamlessly and

securely linked LMR and LTE devices

across the LA-RICS network. WAVE’s

push-to-talk function allowed agen-

cies to easily customize talkgroups for

each parade security zone, whether re-

sponders were using broadband smart-

phones, LMR radios or other devices.

“As the country moves closer to

starting construction on a national

broadband public safety network,

we understand the advantages pub-

lic safety agencies can achieve using

broadband technology during events

such as LA-RICS deploying at the

Rose Parade,” said Travis Boettcher,

Vice President of sales, Motorola So-

lutions, “Our software, managed ser-

vices and LTE-enabled devices help

public safety agencies realize the im-

mense potential broadband has to both

keep first responders safe and help

them do their jobs even more effec-

tively.”

The current LA-RICS system,

built with Motorola Solutions strate-

gic partner Ericsson, has more than

70 LTE towers and will have a grow-

ing number of LMR sites to boost the

overall system’s appeal to public safe-

ty agencies as more towers are added.

LA-RICS represents the largest of the

Early Builder projects that are part of

the First Responder Network Author-

ity (FirstNet). As the prime contrac-

tor for LA-RICS, Motorola Solutions

continues its global leadership in

creating public safety broadband net-

works that complement existing LMR

infrastructure.

Page 46: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com44

application/ case study

nec updates postal automation System for Hong Kong Post

Function for reading and sorting addresses written in traditional chinese characters newly introduced

NEC Corporation has introduced a

function for reading and sorting

addresses written in traditional Chinese

characters to the postal automation sys-

tems operated by Hong Kong Post, the

postal administration of the Hong Kong

Special Administrative Region of the

People’s Republic of China.

In recent years, Hong Kong has wit-

nessed a rise in the number of postal

items addressed in traditional Chinese

characters. This has in turn boosted the

need for automated sorting and process-

ing of addresses written in traditional

Chinese characters in addition to those

handwritten or printed in English.

This new function has been intro-

duced to 15 systems delivered to Hong

Kong Post by NEC on several occasions

since 2008 that are currently in opera-

tion at the Central Mail Centre in Kow-

loon Bay. The introduction of this func-

tion enables the automatic sorting and

processing of up to 564,000 postal items

with addresses written in traditional Chi-

nese characters per hour, thereby con-

tributing to the improvement of Hong

Kong Post’s operational efficiency.

NEC has been doing business with

Hong Kong Post for approximately 30

years since the postal operator’s intro-

duction of a postal automation system in

the latter half of the 1980s. The introduc-

tion of this function was made possible

by the high acclaim NEC has received

over the years for its achievements and

technological capabilities.

NEC began developing its postal au-

tomation system business in 1961, and

has since then delivered systems to post-

al operators in more than 50 countries

around the world. In Japan, domestic

postal operators have utilized a function

for reading and sorting addresses written

in Chinese characters as part of postal

automation processing since the 1980s.

The introduction of this function by

Hong Kong Post was made possible by

applying the wealth of know how NEC

has developed in Japan over the years

in reading and sorting addresses written

in Chinese characters. Moreover, it has

resulted in increased efficiency and a re-

duction in the amount of time needed for

processing.

Postal automation system inside the Central Mail Centre

NICE Actimize, a NICE business

and the industry's largest and

broadest provider of a single financial

crime, risk, and compliance software

platform for the financial services indus-

try has been selected by First Tech Fed-

eral Credit Union to implement Actim-

ize Essentials cloud solutions, including

anti-money laundering and fraud appli-

cations. First Tech Federal Credit Union,

a $9.4 billion financial institution, serves

many of the world’s leading technology

companies and their employees.

NICE Actimize Essentials is a

software-as-a-service (SaaS) created to

meet end-to-end anti-money laundering

and fraud detection requirements, pro-

viding multiple best-of-breed modules

that detect and score a range of banking

activity, including transaction monitor-

ing, customer due diligence, watch list

filtering, and Suspicious Activity Report

(or SAR) filings.

NICE Actimize Essentials also offers

integrated case management capabilities

that feature pre-defined workflows and

checklists, as well as pre-defined users

actimize selected by first tech federal credit union to implement financial crime cloud strategy

Actimize cloud essentials provides best-of-breed anti-money laundering, fraud and case management cloud applications

Page 47: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com45

application/ case study

While the aging population rises with

the declining birth rate, healthcare

has become a crucial issue all over the

world. Security in and around the health-

care institution is always a major concern

due to the open nature of these places and

the sensitivity of hospital operations. To

protect the staff, patients, visitors, as well

as the assets in many areas in the hospital,

the security requirements are much more

stringent than those in regular surveil-

lance applications. Being a professional

solution provider in a vertical application,

Surveon offers complete healthcare solu-

tions, including high-resolution cameras,

enterprise hardware RAID NVR as well

as enterprise VMS with real-time VA to

detect forbidden areas like patient rooms,

protecting the patients and staff from po-

tential risks in time.

Many people, including patients and

their families, medical professionals, and

hospital suppliers crowd many areas in

the hospital every day. Due to the open

nature of healthcare institutions, even

experienced system integrators might

encounter some challenges in some ar-

eas like patient rooms, supply rooms or

medicine pick-up counter, where it needs

much more stringent monitoring than

regular surveillance applications. With

smart image optimizers, Surveon cam-

eras can analyze lighting changes and

automatically adjust the image functions

to ensure clarity can be obtained under

different lightings. Moreover, Surveon

dome cameras support audio in/ out with

phone jacks, providing hospitals an easy

way to record and manage the conflicts or

disputes in the emergency room. Among

Surveon camera selection, 3MP bullet

CAM3471HEM with smart HDR and 3x

zoom autofocus, 2MP indoor dome cam-

era CAM4311S2 with audio in/ out with

phone jacks plus 3MP outdoor speed

dome CAM6471EZ could be the options

in such application.

For medium-large project scale, the

high bandwidth and storage demand of

these cameras could generate major chal-

lenges in terms of overall application qual-

ity and stability. The embedded hardware

RAID accelerator in Surveon NVR en-

sures that the multi-channel cameras have

access to the required bandwidth when

recording images, reducing the instability

often seen when systems are conducting

high I/O operations for extended periods

of time. In addition, through Surveon

Control Center (SCC), the video central

management tool, the advanced electronic

maps and expansion up to eight screens

at the user end can easily meet future de-

mand growth, protecting the patients and

staff from potential threats in time.

Surveon healthcare solutions have

been successfully adopted in city hos-

pital in Macedonia and the Taipei City

Hospital in Taiwan. “Combined with

easy management and excellent cost effi-

ciency, Surveon’s solutions have enabled

us to greatly enhance security around our

premises and thereby boost the overall

operations of the hospital,” said the pro-

ject integrator of City Hospital in Mac-

edonia.

surveon upgrades Hospital security with complete solutions

and roles. This highly secure cloud-based

software-as-a-service combines behavio-

ral analytics and a rules engine to enable

accurate and efficient detection of money

laundering and fraud activities.

“As an institution with a discerning,

technologically sophisticated member

base, it’s vital that our First Tech team

engages with a financial crime solutions

provider like NICE Actimize who can

grow with us and manage our require-

ments across both anti-money launder-

ing and fraud-related concerns,” said

Joseph Harrison, Vice President, Com-

pliance, First Tech Federal Credit Union,

“With NICE Actimize’s industry-proven

experience, we are confident that this

strategy will enable us to meet the de-

manding requirements of regulators.”

“Many solutions built for credit un-

ions don’t effectively scale as their needs

evolve, while others are too costly or

cumbersome for their operations,” said

Cenk Ipeker, Head of NICE Actimize’s

Cloud business, “NICE Actimize Essen-

tials offers the functionality, depth and

upward growth capability necessary for

those institutions to grow and protect

their investment in fighting financial

crime.”

Page 48: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com46

application/ case study

In expansive community facilities,

the ability to quickly and clearly

notify and relay instructions to visi-

tors during emergency situations is

critical to public safety and security.

When Long Island, New York integra-

tion firm Rapid Motion Technology

deployed a new emergency paging

system at a 100,000-square foot cul-

tural and community center in Brook-

lyn this fall, they selected a Barix

Audio over IP solution, supplied by

its US distributor LineQ, to provide

the flexibility, advanced functionality

and installation efficiency the project

required.

The community center features a

swimming pool, gymnasium and fit-

ness center, and hosts between 500

and 600 visitors at any given time

across five floors plus a rooftop play-

ground area. With no existing paging

system in place, the center’s manage-

ment set out to enhance visitor safety

with a system to play pre-recorded

audio messages throughout the build-

ing or to specific, targeted zones in the

event of evacuations, fires, lockdowns

or other emergency situations.

Brought into the project by Gleis

Security Consulting, Rapid Motion

Technology looked to an IP-based so-

lution to overcome significant physi-

cal challenges. “The building had

fully closed, Sheetrock ceilings, which

made wiring difficult even within indi-

vidual floors,” said Jason Hagler, CEO

of Rapid Motion Technologies, “With

an Audio over IP solution, we were

able to use the facility’s existing CAT6

network infrastructure, avoiding the

extensive work that would have been

needed to run feeds between floors.”

In-depth conversations with LineQ

quickly overcame Hagler’s initial

hesitation about using IP-based au-

dio over the existing network, “I was

concerned about bandwidth impact

on the customer’s other applications,

but the Barix solution shares the LAN

very well with other network traffic.

It requires very little bandwidth, and

LineQ worked closely with me to de-

sign the optimal configuration.”

Seven Barix Annuncicom PS1

desktop IP paging stations are distrib-

uted across the building’s five floors,

rooftop area and central security of-

fice. BarixExstreamer 100 IP audio

decoders, located in equipment racks

on each level, receive and decode the

audio, which Clarity amplifiers by

Valcom then feed to ceiling-mounted

speakers.115 speakers are dedicated

to paging, while integration between

the Barix units and the building’s pre-

existing, Clarity-powered background

music system enables pages to over-

ride music playing over additional

speakers.

Each Barix paging station can

perform an ‘all call’ to every speaker

throughout the building or target just

specific areas assigned to that station,

such as its own floor. “The Barix sys-

tem makes it easy to configure tar-

geted paging zones,” said Hagler, “We

simply gave each Exstreamer receiv-

ing unit a static IP address, and speci-

fied the IP addresses that each Annun-

cicom’s audio is directed to. And if

the customer wants us to modify the

mapping, we just add or change IP ad-

dresses, with no wiring required.”

The Barix solution saved the in-

tegrator and the community center

both time and money. “Using IP audio

saved close to a week that we would

have spent coring through floors and

running wiring, and saved our custom-

er thousands of dollars on labor and

materials,” said Hagler, “The speakers

took most of the installation time, but

we had the Barix solution itself up and

running in under six hours. It’s very

user-friendly, and the technical sup-

port from Barix and LineQ is excep-

tional.”

Hagler was equally impressed with

the end result. “Voice intelligibility is

critical in this type of application, and

the Barix audio is incredibly crisp,” he

said, “From a timeliness standpoint,

the delay from paging until it hits the

speakers is less than 3 or 4 millisec-

onds – you don’t even realize there’s

any delay at all. And for the customer,

the system is easy to adjust or expand

if their needs change. The Barix solu-

tion lived up to all of our expectations,

and I’d definitely use it again.”

lineQ supplies Barix ip paging solution for Multi-story new York community center Audio over IP system enables operational flexibility across multiple targeted paging zones, while

ease of integration saves time, effort and cost

application/ case study

Page 49: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com47

feature

For CNL Software, 2016 was an-

other big expansion year, we beat

market growth forecasts by a sizable

margin for the second year in a row.

With increased head count, globally,

and escalated sales in both the US &

EMEA, the company has solidified its

position as one of the technology lead-

ers in the global PSIM market. We not

only grew our number of staff, offices,

customers and partners in the last 12

months, but we also developed a great-

er understanding of what is valuable to

our partners and clients. We recognize

and sincerely thank our sales partners,

without whom, we would have not

achieved this level of growth.

ThePSIMmarketin2016

In a year where national security has

been shown to be relatively power-

less against the evolving threat of small

terror cells, the need for coverage of

large scale CCTV, both public space

and private has never been greater. At

a time when almost all police and mass

transit operations are facing reduced

budgets for security operations, mean-

ing fewer feet on the street, there has

been an increased focus on the use of

technology, using digital ‘eyes’ as a

force multiplier for officers and guards.

These eyes on the street, work 24/7/365

with a low cost of maintenance and lit-

tle intervention required. The may not

prevent attacks, but they can assist in-

vestigations and the apprehension of

offenders.

With the increased requirement

for CCTV, however, comes the need

to rapidly retrieve footage from both

public and private systems along with

the problem of integrating ‘legacy’

systems, which, in many cases, is best

served by a PSIM solution. This is not

in itself, a Safe City solution, but it is

a surveillance solution that forms a vi-

tal part of a much wider Safe City pro-

gram. PSIM is a smart way to connect

vast numbers of DVR/ NVR/ CCTV

systems, from multiple vendors, to re-

trieve video of interest for distribution

to the force operatives who require the

information. What has been signifi-

cant in 2016 is the growing number of

law enforcement agencies around the

world who now acknowledge that the

best solution comprises public/ private

co-operation as well as use of phones,

drones and whatever technology gives

them access to video most accurately

and/ or quickly.

With market analysts across the

board predicting very high growth in

the PSIM market – on average about

25%, but some as high as nearly 35%

CAGR, the question is not if PSIM has

a value proposition, but how do the

Systems Integrators (SIs) engage and

work with the PSIM vendors. There are

currently only a limited number of real

PSIM ‘enabled’ SIs, who can handle

from sales enquiry through to imple-

mentation and maintenance support.

The challenge to system integrators

has been the large, complex, one off

solutions that require ongoing mainte-

nance and development, where not just

security and facilities are involved, but

increasingly business process as well.

psiM review and forecast

By KeithBloodworth–CEO,CNLSoftware

for 2017

Page 50: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com48

feature

Those who have been working with

PSIM are seeing the benefits of their

investment with increased revenue,

increased margin as well as improved

customer relationships.

Predictionsandobservations for the 2017PSIMmarket

Many of the higher end Video

Management Systems (VMS)

and Access Control Systems (ACS)

manufacturers have added 3rd party in-

tegration capability to their solutions,

partly due to market need and partly to

compete with entry level PSIM play-

ers, who mainly offer a ‘Common Op-

erating Picture’ without much added

intelligence, custom GUI designs or

workflow. Entry level PSIM vendors

are finding it harder to demonstrate

additional value to the market as the

integrated solutions from mainstream

VMS companies have an increasingly

good offering at that level. We predict

the demise of some of the ‘pseudo’

PSIM vendors in 2017, as well as an in-

crease in the entry PSIM market share

taken by VMS vendors.

We expect to see ongoing signifi-

cant growth for Enterprise level PSIM

vendors, where PSIM is a customized,

mission critical solution for the client,

with tailored user interfaces, workflows

and standard operating procedures.

Here PSIM is widely recognized as a

requirement of all high-end integration

programs, particularly in the Critical

Infrastructure Protection, mass transit,

Oil and Gas, nuclear and Homeland

Security markets.

Market consolidation andspecialization

The overall acquisition trend con-

tinued during 2016, resulting in

more major consolidation taking place.

Larger global players led on the acqui-

sition front, particularly of IP based

vendors, examples being Konica buy-

ing Mobotix, Honeywell acquired

Xtralis and Axis buying 2N, an emerg-

ing IP based intercom vendor as well

as Cognimatics, a video analytics spe-

cialist in retail solutions. M&A has

been on the rise for some years and this

year has given the security world one

of its largest upheavals with JCI tying

up with Tyco, making a seriously large

global player, and potentially one of

the few global System Integrators.

From the end users view, it is good

that these leading market players are

buying exciting new technologies, in

turn making them more accessible

through their larger distribution net-

works. It may seem odd that Securitas

for example has bought an integrator

(Diebold) as they are best known for

their man guarding business, but per-

haps it is time that companies hiring

out security staff will be investing in

supplying high value technology solu-

tions that could supplement the man

guarding element of their offerings,

providing more value to their clients.

PSIM+Analytics=IncreasedEfficiency

2016 saw the return of several highly

promising technologies which have

failed to deliver to the security market

the first time around. Most notably,

video analytics is back, especially em-

bedded in the camera for live detection

or as a forensic tool to retrieve video

clips needed for post incident investi-

gations.

Where this becomes interesting

is the use of mixed technologies from

multiple vendors to build an end user

application, as required and defined by

a client. This is how PSIM and other

3rd party vendors, particularly analytics

can offer huge reduction in operations,

costs and time by allowing automa-

tion in event identification and process.

Analytics used on their own are not a

solution, but as part of a wider, more

encompassing operation, can add de-

tection and tracking as well as identify

from vast amounts of video data from

multiple vendors.

Security assets saving operationalcosts–watchthisspacein2017

A major development this year has

been the mixed use of security

assets to support business operations.

CNL Software has previously deployed

rail transit solutions with operational

as well as security benefits, but in

2016, we saw this strategy adopted by

port and airport end users. Now, mo-

bile phone and tablets are used to com-

municate to and from the control room,

Whathasbeensignificantin 2016 is the growingnumber of law enforce-mentagenciesaroundtheworld who now acknowl-edge that the best solu-tioncomprisespublic/pri-vate co-operation aswellasuseofphones,dronesand whatever technologygivesthemaccesstovid-eo most accurately and/orquickly.

Page 51: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com49

feature

managing operational incidents in the

field such as accidents, equipment

maintenance and logistics etc. In this

way, security assets are used to support

business operations and pave the way

for even further investments in secu-

rity technology as it is supporting the

business mission. This ‘business’ criti-

cal element will remain the domain of

Enterprise PSIM vendors.

Drones: The double-edged sword

Fast emerging in the first responder

community is the use of low cost

drones, which can be deployed and

utilized as fast and geo flexible CCTV

cameras for incident management of

all types. However, this evolving tech-

nology needs to be managed, to provide

the required information on the situa-

tion as the right time and technology

is now required in the command and

control room for identification and bi-

directional use of this geo located vid-

eo – hence the need for even smarter

PSIM solutions with the ability to take

the workflow elements out of the field

and in the hands of operations staff.

The problem for many control rooms is

that drones are also in the hands of the

criminals, so detection and elimination

will also come to the control room. One

of the major benefits here for PSIM is

the ability to rapidly change and add

new technologies in a fast-changing

world.

Federated solutions for largerenterprises

Users of multiple numbers of con-

trol rooms are now looking for

them to be aggregated and managed

from a central command facility, main-

taining both local and centralized op-

erations. CNL Software has several

very large examples, where this is now

in use and is having a huge ROI on de-

ployment, management of the assets,

Enterprise wide updating as well as

managing all the required information

at all points in the enterprise. DHS,

armed forces, government and minis-

tries are obvious areas in need of this

federated approach to PSIM, and this

is set to grow as a specialization in the

next few years. It is already a complex

market for high end command and

control solutions, however, it is perfect

replacement for expensive bespoke so-

lution.

Tackling the cyber front

No predictions would be complete

without mentioning cyber secu-

rity, especially considering recent at-

tacks. Today, cyber represents one of

the biggest threats to security as large

scale aggregations increase the threat

surface. Partnerships are becoming

catalysts for co-operation between cy-

ber vendors and physical security spe-

cialist, to offer end users a complete

solution. CNL Software, as founder

members of the IoT Security Founda-

tion, is working with the cyber industry

to both understand and meet the chal-

lenges of today and tomorrow. We do

not, however, believe we should be a

cyber vendor, just encompass the best

solutions via our PSIM platform.

Final words

In 2017, Enterprise PSIM will con-

tinue to raise its game in areas that

were once the reserve of defense con-

tractors and semi military companies.

Further expansion into C2i will see

greater levels of intelligence, includ-

ing tracking, slew to cue, aggregation

of sonar and radar, mass communica-

tions, 3D, Federated systems and cus-

tom built applications such as incident

management, for specific verticals.

Many of these will be at a scale that

only dedicated PSIM products will

perform, both defining and confirming

the requirement for PSIM in verticals

where security hugely impacts busi-

ness efficiencies.

PSIM will oppose the industry

trend and in contrast to other secu-

rity systems, its greater capability and

value creation will drive its growth as

opposed to ever reducing prices. Will

2017 be the breakthrough year for

PSIM? Perhaps not, but it will be the

year that many of the global SIs start to

define strategies for their participation

in this growing market – both in impor-

tance and revenues.

Weexpect to seeongoing significant growth forEn-terpriselevelPSIMvendors,wherePSIMisacustom-ized,missioncriticalsolutionfortheclient,withtailoreduserinterfaces,workflowsandstandardoperatingpro-cedures.HerePSIMiswidelyrecognizedasarequire-mentofallhigh-endintegrationprograms,particularlyin the Critical Infrastructure Protection,mass transit,OilandGas,nuclearandHomelandSecuritymarkets.

Page 52: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com50

feature

Thales, a leader in critical informa-

tion systems, cybersecurity and

data security, announces the results of

its 2017 Thales Data Threat Report, is-

sued in conjunction with analyst firm

451 Research. Sixty-eight percent of

respondents have experienced a breach

with 26 percent experiencing a breach

in the last year–both numbers that rose

from last year. Paradoxically, overall se-

curity spending is also up; in 2017, 73

percent of organizations increased IT

security spending – a marked jump from

2016 (58 percent).

Old habits die hard

The report, which is in its fifth year,

polled 1,100 senior IT security ex-

ecutives at large enterprises around the

world and indicates an ongoing dis-

connect between the security solutions

organizations spend money on, and

the ability of those solutions to protect

sensitive data. While 30 percent of re-

spondents classify their organizations as

‘very vulnerable’ or ‘ex-

tremely vulnerable’ to data

attacks (and the number

of breaches continues to

rise) the two top spending

priorities are network (62

percent) and endpoint (56

percent) protection solu-

tions. Counterintuitively,

spending on data-at-rest

solutions (46 percent)

comes last.

Garrett Bekker, senior analyst, in-

formation security at 451 Research and

author of the report says, “One possible

explanation for this troubling state? Or-

ganizations keep spending on the same

solutions that worked for them in the

past but aren’t necessarily the most ef-

fective at stopping modern breaches.

Data protection tactics need to evolve to

match today’s threats. It stands to reason

that if security strategies aren’t

equally as dynamic in this

fast-changing threat environ-

ment, the rate of breaches will

continue to increase.”

CompliancethetopdriverforITsecurityspending

The reasons behind secu-

rity spending decisions

are varied, but the key driver

remains constant: compliance.

2017 thales data threat report security spending decisions leave

sensitive data VulnerableDespite rise in breaches, companies still prioritizing network and

endpoint solutions over encryption

THE BIGDISCONNECT

2017 DATA THREAT LANDSCAPE

“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”

—Garrett Bekker, 451 Principal Analyst, Information Security

BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING

56%Endpoint

and mobile

62%Network

52%Analysis and

correlation tools

46%Data at rest

51%Data in motion

GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS

WHAT TO DO ABOUT IT

BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED

DISCONNECT

Had a data breach: Increasing IT Security spending to protect data:

Vulnerable

68%61%

88%

2016 2017

In the last year:

26%21%2016 2017

30% Very or Extremely Vulnerable

2015 2016 2017

73%

54% 58.5%

46%44%

Vulnerable90%

29%Very or Extremely

UNITED STATES

Least vulnerable77%

19%Very or Extremely

BRAZIL

1

DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY

DISCONNECT

2

BUILD IN DATA SECURITY FROM THE START

REPRIORITIZEYOUR IT SECURITY TOOL SET

DISCONNECT

3

Believecompliance will prevent

data breaches

20162017

Compliance is the top priority for IT security spend of the last two years:

59%

of IT security professionals are deploying advanced technologies without the required data security

63%

57%49%

47%44%

39%31%

19%9%

SaaSIaaS

Big DataPaaS

Mobile AppsIoT

ContainersBlock Chain

Enterprise use of sensitive data within advanced technology environments

11 DISCOVER AND CLASSIFY

2

Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity

Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT

DON’T JUST CHECK OFFTHE COMPLIANCE BOX

33

ENCRYPTION AND ACCESS CONTROL4

Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments

Encryption needs to move beyond laptops and desktops

Containers: Encrypt and control access to data - within containers and underlying storage

IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats

Data center: File and application level encryption and access controls

Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS

Big Data: Encryption and access control within the environment

CLICK TO DOWNLOAD REPORT

FOLLOW US ON:

Most vulnerable95%

45%Very or Extremely

GERMANY

THE BIGDISCONNECT

2017 DATA THREAT LANDSCAPE

“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”

—Garrett Bekker, 451 Principal Analyst, Information Security

BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING

56%Endpoint

and mobile

62%Network

52%Analysis and

correlation tools

46%Data at rest

51%Data in motion

GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS

WHAT TO DO ABOUT IT

BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED

DISCONNECT

Had a data breach: Increasing IT Security spending to protect data:

Vulnerable

68%61%

88%

2016 2017

In the last year:

26%21%2016 2017

30% Very or Extremely Vulnerable

2015 2016 2017

73%

54% 58.5%

46%44%

Vulnerable90%

29%Very or Extremely

UNITED STATES

Least vulnerable77%

19%Very or Extremely

BRAZIL

1

DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY

DISCONNECT

2

BUILD IN DATA SECURITY FROM THE START

REPRIORITIZEYOUR IT SECURITY TOOL SET

DISCONNECT

3

Believecompliance will prevent

data breaches

20162017

Compliance is the top priority for IT security spend of the last two years:

59%

of IT security professionals are deploying advanced technologies without the required data security

63%

57%49%

47%44%

39%31%

19%9%

SaaSIaaS

Big DataPaaS

Mobile AppsIoT

ContainersBlock Chain

Enterprise use of sensitive data within advanced technology environments

11 DISCOVER AND CLASSIFY

2

Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity

Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT

DON’T JUST CHECK OFFTHE COMPLIANCE BOX

33

ENCRYPTION AND ACCESS CONTROL4

Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments

Encryption needs to move beyond laptops and desktops

Containers: Encrypt and control access to data - within containers and underlying storage

IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats

Data center: File and application level encryption and access controls

Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS

Big Data: Encryption and access control within the environment

CLICK TO DOWNLOAD REPORT

FOLLOW US ON:

Most vulnerable95%

45%Very or Extremely

GERMANY

THE BIGDISCONNECT

2017 DATA THREAT LANDSCAPE

“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”

—Garrett Bekker, 451 Principal Analyst, Information Security

BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING

56%Endpoint

and mobile

62%Network

52%Analysis and

correlation tools

46%Data at rest

51%Data in motion

GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS

WHAT TO DO ABOUT IT

BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED

DISCONNECT

Had a data breach: Increasing IT Security spending to protect data:

Vulnerable

68%61%

88%

2016 2017

In the last year:

26%21%2016 2017

30% Very or Extremely Vulnerable

2015 2016 2017

73%

54% 58.5%

46%44%

Vulnerable90%

29%Very or Extremely

UNITED STATES

Least vulnerable77%

19%Very or Extremely

BRAZIL

1

DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY

DISCONNECT

2

BUILD IN DATA SECURITY FROM THE START

REPRIORITIZEYOUR IT SECURITY TOOL SET

DISCONNECT

3

Believecompliance will prevent

data breaches

20162017

Compliance is the top priority for IT security spend of the last two years:

59%

of IT security professionals are deploying advanced technologies without the required data security

63%

57%49%

47%44%

39%31%

19%9%

SaaSIaaS

Big DataPaaS

Mobile AppsIoT

ContainersBlock Chain

Enterprise use of sensitive data within advanced technology environments

11 DISCOVER AND CLASSIFY

2

Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity

Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT

DON’T JUST CHECK OFFTHE COMPLIANCE BOX

33

ENCRYPTION AND ACCESS CONTROL4

Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments

Encryption needs to move beyond laptops and desktops

Containers: Encrypt and control access to data - within containers and underlying storage

IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats

Data center: File and application level encryption and access controls

Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS

Big Data: Encryption and access control within the environment

CLICK TO DOWNLOAD REPORT

FOLLOW US ON:

Most vulnerable95%

45%Very or Extremely

GERMANY

Almost half (44 percent) of respondents

list meeting compliance requirementsas

their top spending priority, followed by

best practices (38 percent) and protect-

ing reputation/ brand (36 percent). Fifty-

nine percent also believe compliance is

‘very’ or ‘extremely’ effective at pre-

venting data breaches. While compli-

ance regulations provide a data security

blueprint, they are by no means the only

consideration when building a security

Page 53: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com51

feature

strategy robust enough to withstand to-

day’s sophisticated attackers.

External and internal cyberactorsthetopthreat

As in years past, the 2017 Data

Threat Report explored threat per-

ceptions. All vertical industries polled

identified cyber criminals as the top

threat (44 percent), followed by hack-

tivists (17 percent), cyberterrorists (15

percent) and nation-states (12 percent).

With respect to internal threats, 58 per-

cent of respondents believe privileged

users are the most dangerous insiders (a

slight decrease from last year’s 63 per-

cent). At 44 percent, executive manage-

ment is seen as the second-most-risky

insider, followed by ordinary employ-

ees (36 percent) and contractors (33

percent).

Securing data from future threats: Promiseorperil?

In this age of the cloud and SaaS en-

terprise deployments, more and more

enterprise data is being created, trans-

ported, processed and stored outside

corporate network boundaries, making

traditional perimeter-based security con-

trols and legacy network and endpoint

protection solutions increasingly less

relevant. Other new, popular technolo-

gies also bring added security challeng-

es. For example, nearly 40 percent of

respondents are using Docker containers

for production applications. At the same

time, 47 percent cite security as the ‘top

barrier’ to broader Docker container

adoption.

Peter Galvin, Vice President of

Strategy, Thales e-Security says, “En-

terprises today must inevitably confront

an increasingly complicated threat land-

scape.Our world, which now includes

the cloud, big data, the IoT and Docker,

calls for robust IT security strategies

that protect data in all its forms, at rest,

in motion and in use. Businesses need

to invest in privacy-by-design defense

mechanisms – such as encryption – to

protect valuable data and intellectual

property and view security as a business

enabler that facilitates digital initiatives

and builds trust between partners and

customers.”

To offset the data breach trend and

take advantage of new technologies and

innovations, organizations should, at a

minimum, adhere to the following prac-

tices:

● Leverage encryption and access con-

trols as a primary defense for data

and consider an ‘encrypt everything’

strategy.

● Select data security platform offer-

ings that address a variety of use

cases and emphasize ease-of-use.

● Implement security analytics and

multi-factor authentication solutions

to help identify threatening patterns

of data use.

Source/ methodology

The data in this study is based on

Web and phone interviews of 1,105

senior executives in Australia, Brazil,

Germany, Japan, the UK and the US.

Most have a major influence on or are

the sole decision maker for IT at their

respective companies.

Respondents represented the follow-

ing industries: automotive; education;

energy; engineering; federal govern-

ment; healthcare; IT; retail; and tele-

communications.

THE BIGDISCONNECT

2017 DATA THREAT LANDSCAPE

“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”

—Garrett Bekker, 451 Principal Analyst, Information Security

BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING

56%Endpoint

and mobile

62%Network

52%Analysis and

correlation tools

46%Data at rest

51%Data in motion

GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS

WHAT TO DO ABOUT IT

BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED

DISCONNECT

Had a data breach: Increasing IT Security spending to protect data:

Vulnerable

68%61%

88%

2016 2017

In the last year:

26%21%2016 2017

30% Very or Extremely Vulnerable

2015 2016 2017

73%

54% 58.5%

46%44%

Vulnerable90%

29%Very or Extremely

UNITED STATES

Least vulnerable77%

19%Very or Extremely

BRAZIL

1

DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY

DISCONNECT

2

BUILD IN DATA SECURITY FROM THE START

REPRIORITIZEYOUR IT SECURITY TOOL SET

DISCONNECT

3

Believecompliance will prevent

data breaches

20162017

Compliance is the top priority for IT security spend of the last two years:

59%

of IT security professionals are deploying advanced technologies without the required data security

63%

57%49%

47%44%

39%31%

19%9%

SaaSIaaS

Big DataPaaS

Mobile AppsIoT

ContainersBlock Chain

Enterprise use of sensitive data within advanced technology environments

11 DISCOVER AND CLASSIFY

2

Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity

Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT

DON’T JUST CHECK OFFTHE COMPLIANCE BOX

33

ENCRYPTION AND ACCESS CONTROL4

Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments

Encryption needs to move beyond laptops and desktops

Containers: Encrypt and control access to data - within containers and underlying storage

IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats

Data center: File and application level encryption and access controls

Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS

Big Data: Encryption and access control within the environment

CLICK TO DOWNLOAD REPORT

FOLLOW US ON:

Most vulnerable95%

45%Very or Extremely

GERMANY

THE BIGDISCONNECT

2017 DATA THREAT LANDSCAPE

“SPENDING ON IT SECURITY TO PROTECT DATA IS UP – SHARPLY IN SOME SECTORS – YET SUCCESSFUL DATA BREACHES AREALSO UP SIGNIFICANTLY. CLEARLY, THERE’S STILL A BIG DISCONNECT.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“Compliance is a minimum table stake for regulated enterprises ... But being compliant does not mean you won’t be breached.”

—Garrett Bekker, 451 Principal Analyst, Information Security

“It’s no longer enough to just secure our networks and endpoints. With the rapid and continuing growth of data outside the four walls of the enterprise, spending on securing internal networks from external threats is less and less effective – and less relevant.”

—Garrett Bekker, 451 Principal Analyst, Information Security

BREACHES ACCELERATE IN SPITE OF INCREASED IT SECURITY SPENDING

56%Endpoint

and mobile

62%Network

52%Analysis and

correlation tools

46%Data at rest

51%Data in motion

GLOBAL IT SECURITY PROS REPORT THEIR ORGANIZATIONS ARE VULNERABLE TO DATA THREATS

WHAT TO DO ABOUT IT

BEING COMPLIANT DOESN’T MEANYOU WON’T BE BREACHED

DISCONNECT

Had a data breach: Increasing IT Security spending to protect data:

Vulnerable

68%61%

88%

2016 2017

In the last year:

26%21%2016 2017

30% Very or Extremely Vulnerable

2015 2016 2017

73%

54% 58.5%

46%44%

Vulnerable90%

29%Very or Extremely

UNITED STATES

Least vulnerable77%

19%Very or Extremely

BRAZIL

1

DATA AT REST PROTECTION NEEDS TO BE A HIGH PRIORITY

DISCONNECT

2

BUILD IN DATA SECURITY FROM THE START

REPRIORITIZEYOUR IT SECURITY TOOL SET

DISCONNECT

3

Believecompliance will prevent

data breaches

20162017

Compliance is the top priority for IT security spend of the last two years:

59%

of IT security professionals are deploying advanced technologies without the required data security

63%

57%49%

47%44%

39%31%

19%9%

SaaSIaaS

Big DataPaaS

Mobile AppsIoT

ContainersBlock Chain

Enterprise use of sensitive data within advanced technology environments

11 DISCOVER AND CLASSIFY

2

Cloud and SaaS break legacy IT security models – Data security with encryptionand access controls across environments is required Service-based solutionsand platforms that include automation are preferred for reduced costs and simplicity

Get a better handle on the location of sensitive data,particularly for Cloud, Big Data, Containers and IoT

DON’T JUST CHECK OFFTHE COMPLIANCE BOX

33

ENCRYPTION AND ACCESS CONTROL4

Move beyond compliance to greater use ofencryption and BYOK, especially for cloud andother advanced technology environments

Encryption needs to move beyond laptops and desktops

Containers: Encrypt and control access to data - within containers and underlying storage

IoT: Use secure device IDand authentication, as wellas encryption of data at reston devices, back end systems and in transit to limit data threats

Data center: File and application level encryption and access controls

Cloud: Encrypt andmanage keys locally,BYOK enables safe SaaS, PaaS and IaaS

Big Data: Encryption and access control within the environment

CLICK TO DOWNLOAD REPORT

FOLLOW US ON:

Most vulnerable95%

45%Very or Extremely

GERMANY

Page 54: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com52

product showcase

Arecont Vision megapixel cameras

are cybersecurity-hardened. Hack-

ers are increasingly using surveillance

cameras as their point of attack, used to

break into, corrupt, or disrupt surveil-

lance systems, computer networks, and

the Internet. Cybersecurity is now more

important than ever.

Many IP surveillance cameras have

relied on network security to protect

them from abuse, or offered no security

at all. That is changing as cybersecu-

rity attacks become more sophisticated.

Manufacturers need to balance the user

experience with security, and no product

should be connected to the network un-

less it offers 16 character ASCII pass-

words and the ability to receive feature

and security updates after installa-

tion.

A more challenging issue is cy-

ber-hardening of surveillance cam-

eras. Most cameras run common op-

erating systems (OS), such as Linux.

This lets the manufacturer add third

party code and add-on chips for new

features, rather than developing eve-

rything on their own, for both cost

savings and time-to-market reasons.

Unfortunately, this opens the cam-

era to cyberattack through potential

buried malware and in providing OS

entry points to attackers.

Verisign, a US-based network infra-

structure and security company, reports

that the frequency of cyberattacks is

increasing by 75% year-over-year (see

https://goo.gl/tHVZKR).

Tens of thousands of cameras,

NVRs, and Internet-of-Things (IoT)

enabled-devices have been misused

in well-publicized Distributed Denial

of Service (DDoS) attacks. DDoS at-

tacks turn devices into robotic attackers

or ‘bots.’ A September 2016 attack on

Krebsecurity.com and French hosting

firm OHV involved over 140,000 hi-

jacked network cameras and DVRs (see

https://goo.gl/Df4Mkr).

The next month, a major DDoS at-

tack on network monitoring and DNS

routing company Dyn impacted up to

85 web services, slowing or cutting off

access to Amazon, the Financial Times,

Netflix, PayPal, Reddit, Spotify, Twit-

ter, and other sites with an estimated

$100M loss in revenue (see https://goo.

gl/mtyrp8).

On January 31, 2017, the Security

Industry Association Update e-newslet-

ter reported that the police department in

Washington, DC, lost control of 123 of

Arecont Vision’s Cyber-Hardened Cameras

“Arecont Vision megapixel cameras are immune to be-ing used in cyberattacks. All of the cameras’ core functions are developed for use on Arecont Vision’s Massively Par-allel Image Processing Architecture, eliminating the risk of undetected malicious code from a 3rd party. Every camera runs on custom-designed Field Programmable Gate Array (FPGA) integrated circuits that allow the cameras to be updated with the latest security updates plus new features

can be added even after installation.” – Jeff Whitney

VP Marketing, Arecont Vision

product showcase

Page 55: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com53

product showcase

187 NVRs to a ransomware cyberattack.

A city police department outside of

Dallas, Texas was also reported to have

suffered lost video after a similar inci-

dent. Ransomware encrypts the data on

computer systems, and charges a ransom

to have the encryption removed. It was

not revealed if the cameras were used to

propagate these two cyberattacks, or if it

was by other means.

Should a hacker obtain an ID and

password for an Arecont Vision camera,

they are only able access that individual

device. They would be unable to repur-

pose it maliciously, unlike other network

surveillance cameras that have been

proven susceptible in previous cyberat-

tacks time and again.

To protect networks and devices,

Arecont Vision is the proven cyber-hard-

ened camera choice.

Providing a safe camera solution

for video surveillance applica-

tions within hazardous areas, Hikvi-

sion, the world’s leading supplier in

innovative video surveillance prod-

ucts and solutions, has launched

three new ATEX & IECEx certified

standard network cameras, including

bullet and PTZ dome style models.

Explosionresistance

Continuing their goal to develop

and launch surveillance prod-

ucts that fulfil customers’ special

applications needs, Hikvision’s latest

explosion-proof cameras utilize 304

and 316L stainless steel housings for

maximum corrosion and explosion

resistance, and are IP68 water/ dust

ingress rated. For any surveillance

requirement within hazardous envi-

ronments, or environments where the

camera is required to operate within

areas with combustible sources, the

new explosion proof cameras provide

a high-performance and safe imaging

solution. Typical applications are for

potentially hazardous or explosion

risk areas, such as gas & oil pro-

HIKVISION launch High-performance explosion-proof camera range

cessing and storage plants, chemical

plants, industrial sites, deep mines,

or marine applications.

DarkFighter technology

Hikvision’s range of industry-

leading ultra-low-light explo-

sion-proof camera models boast

Hikvision DarkFighter technology,

providing minimum illumination as

low as to 0.005Lux in colour mode

and 0.0005Lux in B/W mode. The

result is crystal-clear colour and

monochrome images in conditions

that would defeat conventional low-

light models. The range also comes

with progressive scan 2MP and

4MP CMOS image sensors, full HD

1080p video at up to 60fps, triple

video streams, 3D DNR and 120dB

WDR.

H.265+Smartcodec

Greatly reducing the required vid-

eo bitrate to reduce bandwidth

and associated storage costs, the new

cameras support the latest Hikvision

H.265+ smart codec technology. An

intelligent algorithm developed by

Hikvision, H.265+ is a remarkable

encoding technology based on the

H.265/ HEVC (High Efficiency Vid-

eo Coding) standard, with the benefit

of being able to greatly decrease the

bitrate of surveillance video through

three core technologies, namely: Pre-

diction Encoding, Noise Suppression

and Bitrate Control.

Accepting 100V-240V AC and

PoE input power, video performance

is enhanced via Smart features such

as Smart Detection, Smart Tracking

and ANPR; the new explosion-proof

camera range delivers a robust video

surveillance camera solution for use

within any harsh/ critical operational

environment. The cameras also sup-

port on-board storage up to 128Gb

via SD card.

Hikvision explosion-proof cam-

eras include the DS-2XE6222F-

IS 2MP Explosion-Proof Network

Bullet Camera, DS-2XE6242F-IS

4MP Explosion-Proof Network Bul-

let Camera and DS-2DF6223-CX

(W) 2MP Explosion-Proof Network

Speed Dome.

Page 56: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com54

product showcase

Sony introduces the all-new RM-

IP500 remote controller that gives

operators easier and more intuitive con-

trol of its latest pan-tilt-zoom (PTZ)

cameras, for a range of applications in-

cluding event production, broadcast and

lecture capture for education.

The RM-IP500 controller is de-

signed to work with Sony’s latest BRC-

X1000, BRC-H900, BRC-H800, and

SRG-360SHE PTZ cameras as well

as the new MCX-500 all-in-one High

Definition (HD) switcher, supporting

SD card recording and IP streaming to

create an easy-to-use event production

system.

“Sony’s all-new RM-IP500 remote

controller is equipped with flexible zoom

patterns, speed control options, presets

and firmware upgrades to offer future

sony’s rM-ip500 remote controller delivers greater flexibility and easier operation of ptZ

cameras for lecture capture and event production

support and new capabilities,” said Riki

Nishimura, General Manager, Business

& Industrial Solutions Marketing Divi-

sion, Professional Solutions Company

(PSAP), Sony Electronics Asia Pacific,

“Furnished with features that are neces-

sary in boosting efficiency, the new con-

troller allows users to single-handedly

select and professionally control each

shot across multiple BRC cameras in

challenging environments.”

GreaterflexibilityandeasieroperationofPTZcameras

The RM-IP500 features single-hand-

ed PTZ joystick operation and can

be customized according to user’s pref-

erence. With selectable zoom control

functions, it provides the option of see-

saw (left hand) or joystick (right hand)

operation. Further, the PTZ speed can

be easily adjusted with the controller’s

knob, and direct buttons are available

for frequently used functions e.g., PTZ

trace memory and preset – at the push

of a button.

Easysetupforlarge scale system installations as well as live event system

Allowing fast set up and streamlines

operations, the new controller sim-

plifies IP assignment for up to 100 cam-

eras using the AUTO IP setting. The user

can program up to 100 preset camera an-

gles for precise, easy manoeuvring. With

a newly designed body, the compact

controller measures 306mm x 159.3mm

x 224.1mm, or 12 1/8” x 6 3/8” x 8 7/8”

(without projection) and can be mounted

on or in any console.

The RM-IP500 offers a host of control

signal formats and control options includ-

ing RS-422 and VISCA over IP as well as:

● VISCA RS-422: RJ-45x 1.

● LAN: RJ-45x 1, 10BASE-T/100BASE-

TX automatically detected.

● GPI I/O (Tally in/ contact out): D-

sub 15-pin type.

The RM-IP500 remote controller is

planned to be available in Asia Pacific

from June 2017 onwards.

cost-effective system configuration possible with single-operator control of up to 100 cameras, memory recall, and PtZ speed adjustments

product showcase

Page 57: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com55

product showcase

UniqueWiseStreamtechnology

Completing the long list of innovative

features built into the PNM-9020V

is WiseStream, a complementary com-

pression technology which dynamically

controls encoding, balancing quality and

compression according to movement in the

image. Bandwidth efficiency is improved

by up to 75% compared to current H.264

technology when WiseStream is combined

with H.265 compression. This ensures that

Hanwha Techwin Europe’s new Wisenet P

series is one of the most bandwidth friend-

ly camera ranges available.

Designed for monitoring large open

areas with just one camera, the

PNM-9020V is equipped with multi-

sensors which enable it to capture superb

quality seamlessly stitched 180° images.

Four 2MP images with 3.6mm lenses

work in harmony to produce the 180°

composite images. This is achieved with

the help of a synchronised alignment le-

ver located in the centre of the camera

which raises and lowers the sensors in

unison to facilitate easy set up.

“The PNM-9020V’s high definition

and panoramic capabilities means end-

users can achieve an exceptionally high re-

turn on investment (ROI), as it can perform

the work of three or four standard HD cam-

eras and so deliver significant savings on

camera purchasing and installation costs,”

said Tim Biddulph, Head of Product Man-

agement for Hanwha Techwin Europe.

Key features

In addition to being equipped with

digital PTZ, the PNM-9020V, which

new samsung wisenet p series panoramic 180° camera with unique

H.265 & Wisestream CompressionHanwha techwin has further broadened its samsung Wisenet P series

with the introduction of a 7.3 megapixel 180° panoramic camera

surveon Boosts surveillance performance with High throughput and long recording dayWith the prevalence of surveil-

lance cameras installed for se-

curity concerns, it’s quite common to

see hundreds or thousands of cameras

in one single project site. To ensure the

surveillance work is carried out without

is IP66 and IK10 rated for vandal-re-

sistance and outdoor use in the harshest

environments, shares many of the inno-

vative, practical features with the four

other models in the Wisenet P series.

These include Digital Auto Tracking,

True Wide Dynamic Range, and Lens

Distortion Correction to deliver opti-

mised images in every situation. Also

provided is bi-directional audio support,

privacy masking, a 12V DC, PoE capa-

bility and an SD card slot to ensure that

video is automatically recorded in the

event of network disruption.

Openplatform

Video analytics such as heat map,

virtual line, enter/ exit and ap-

pear/ disappear are provided as stand-

ard, whilst the power of the open

platform DSP chipset built into PNM-

9020V provides end-users with the

flexibility to run edge-based video ana-

lytics which matches their individual

requirements.

Page 58: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com56

product showcase

trouble, a reliable recording system sup-

porting multiple channels at once with

long-term recording capability would be

something to take into account when it

comes to project requirement. Surveon

offers a performance-driven solution

with high throughput and long record-

ing day, not only supporting hundreds of

channels with more than one-year non-

stop recording but also ensuring all cam-

eras can be recorded and viewed reliably,

giving partners a powerful weapon to in-

crease the chance for tender winning.

Projects like government institu-

tions, casinos, commercial buildings,

and factories are complex scenes involv-

ing people and movement every day.

Therefore, deploying security systems at

a higher level is a must for these public

places. Surveon’s performance-driven

solution offers high throughput and ex-

pandable storage to support hundreds

of channels with long-time recording.

Among Surveon NVR selection, the

Milestone VMS pre-loaded NVR7800

Series or mission critical storage

NVR7300 Series could be the options

in such applications. Different from tra-

ditional system structures composed of

recording server plus a separate storage

device, NVR7800 and NVR7300 Series

are designed as a recording server with

an archiving function, providing part-

ners more cost-effective choices. Be-

sides, the built-in SAS port connection

for JBOD expansion enclosures allows

the system to scale up to 316HDDs,

making NVR7800 and NVR7300 Series

ideal for medium-large scale projects in

need of long-time recording.

The NVR7800 Series with Mile-

stone VMS can support up to 150CH

3MP cameras recording, more than

twice Milestone’s benchmark level in

a non-stop recording scenario. The

MTP report shows that NVR7800 Se-

ries delivers a high level of recording

throughput of nearly 2000 Mbps, ensur-

ing smooth live viewing and recording.

Besides, NVR7800 Series is also fully

compatible with Genetec VMS, serving

300 CH 1.3MP cameras with continuous

recording or 190 CH 1.3MP cameras

with motion detection recording based

on the internal test result. In addition

to the Window OS in NVR7800 Series,

NVR7300 Series comes with Linux OS

plus Surveon enterprise-level VMS,

supporting up to 128CH 5MP cameras

with non-stop recording and delivering

total 768 Mbps recording throughput,

giving partners one more option to meet

requirements for potential surveillance

tenders.

Surveon performance-driven solu-

tion with high throughput and long re-

cording day has been adopted in some

vertical solutions, such as KL Tower, the

highest building in Malaysia, requiring

120-day non-stop recording on the site.

Another success case would be the air-

line catering service provider in Hong

Kong, who is also satisfied with the ful-

filment of continuous recording for 180

days.

avigilon launches Highly anticipated appearance search technology

Avigilon expands video analytics platform with the launch of advanced search technology

Avigilon Corporation has announced

that it has further enhanced its self-

learning video analytics capabilities by

introducing Avigilon Appearance Search

technology immediately available with

Avigilon Control Center (ACC) 6.0 vid-

eo management software.

Avigilon Appearance Search, Avig-

ilon’s newest and most advanced video

analytics technology, is a sophisticated

deep learning artificial intelligence (AI)

search engine that sorts through hours

of footage with ease, allowing users to

quickly locate a specific person of inter-

est across all cameras on an entire site. It

can save time and effort during critical

investigations as it intelligently analyzes

video data helping to track a person’s

route and identify previous and last-

known locations.

“Historically, video surveillance

searches were done on a single camera,

based on time, motion and activity,”

said James Henderson, Avigilon’s Chief

Sales and Marketing Officer, “But with

Avigilon Appearance Search technol-

ogy, users can now easily search for all

instances of a specific person across all

their cameras distributed throughout a

site, with the click of a button. This is

designed to make searching for a person

as easy as searching the internet.”

Avigilon Appearance Search tech-

Page 59: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com57

product showcase

nology is integrated

with ACC 6.0 Enter-

prise edition software,

Avigilon cameras with

self-learning video

analytics and select

Network Video Re-

corders.

“With Avigilon

Appearance Search

technology users can

answer the critical

‘where’ and ‘what’ of video searches quickly and decisively,” said Dr. Mahesh

Saptharishi, Avigilon’s

Chief Technology Of-

ficer, “This is an ex-

citing milestone in the

development of Avig-

ilon’s comprehensive

AI and deep learning

video analytics plat-

form, as we continue

to provide customers

with full solutions for

a broad range of video

surveillance applications.”

Figure: Avigilon Appearance Search technology in ACC 6.0

Milestone releases Highest performing VMs ever

the first product update of 2017 enables record-breaking performance for XProtect users, lower hardware costs and lower total cost of ownership. cybersecurity is another focus in the new

version of the award-winning VMs

Milestone Systems has released

XProtect 2017 R1. Milestone

is committed to delivering three VMS

product releases every year, in addition

to bi-monthly device pack releases sup-

porting third-party devices. This fre-

quent release schedule will ensure Mile-

stone’s rapid response to market and

Milestone community needs.

Highest VMS performance

Thanks to the true open platform

technology in XProtect, Milestone

can rapidly respond to community needs

and enable cost-efficiency in large in-

stallations. For XProtect, this entails

a recording server performance of 3.1

Gigabit/S. This high performance level

Pioneeringhardwareacceleration

In the latest XProtect releases, Mile-

stone has harvested the advantages

of the close relationships with Intel and

Microsoft by implementing hardware

acceleration. The processor-intensive

enables Milestone community partners

to offer large solutions using a reduced

number of servers, or even smaller serv-

ers. This contributes to hardware costs

savings and a simplified infrastructure.

In short, it significantly reduces the total

cost of a Milestone solution.

Page 60: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com58

product showcase

task of decoding (rendering) video is

offloaded to the dedicated graphics sys-

tem (GPU) inside the processer, leaving

the main processor free to take on other

tasks. The GPU is optimized to handle

computer graphics and video, meaning

these tasks will be greatly accelerated.

Using the technology in servers can save

even more expensive computer muscle.

Hardware-accelerated video motion

detection is new in XProtect 2017 R1 -

another industry first for VMS software.

Customers can have twice as many cam-

eras on the same server with the same

CPU load, or experience up to 90 per-

cent reduction in the CPU load with the

same number of cameras on the server.

This use of hardware acceleration lets

mid- to large-scale installations experi-

ence improved performance at a lower

hardware cost.

Hardware acceleration was already

implemented in the XProtect 2016 Smart

Client. This provided an 80 percent re-

duction in the processor load on comput-

ers with selected Intel processors, firm-

ware, drivers and Microsoft operating

systems. This paves the way for the use

of 4K cameras and processing-intensive

video compressions like H.265.

New cybersecurity features

As video management systems are

becoming more and more busi-

ness-critical, cybersecurity is a natural

focus. In 2016, Milestone launched sev-

eral initiatives aimed at strengthening

security in Milestone software. Like the

Hardening Guide that details how an

XProtect installation can be better se-

cured against cyber threats and the Ker-

beros strict user-verification in XProtect.

The XProtect 2017 R1 update in-

cludes several security enhancements

for improved cybersecurity, including

two-step verification and greater control

when granting user permissions for the

Milestone Advanced VMS products.

Two-step verification is an industry-

first security feature for XProtect 2017

R1. It is designed to prevent unauthor-

ized access to the VMS when a password

is compromised, as a code from the us-

er’s mobile phone is needed to complete

login.

Keeping VMS systems isolated from

the Internet is one important element

when it comes to keeping a high security

level. XProtect Smart Maps (introduced

last year) now include support for Open-

StreetMap offline maps: This means that

customers with offline installations can

take advantage of improved situational

awareness by using maps, without ex-

posing their XProtect system to online

threats.

XProtect 2017 R1 is available to the

Milestone community now.

Security integrators looking to grow

their ever-important recurring

monthly revenue (RMR) can capitalize

on a new proactive and profitable ser-

vice offering by adding Viakoo’s unique

Automated Data Verification Solution.

Viakoo’s award-winning and patented

solution – which is field proven at nu-

merous organizations with over 100 mil-

lion hours of surveillance supported –

improves integrators’ service efficiency

by up to 40 percent.

“Viakoo’s Data Verification Solu-

tion provides security integrators with

an easy way to generate a new source

of RMR, while improving their ability

to ensure the integrity and reliability

of their customers’ systems,” said Bud

Broomhead, Chief Executive Officer,

Viakoo, “Security integrators are being

driven by the market to upgrade from re-

active service to proactive service, and

our solution enables them to fully capi-

talize on this trend.”

Viakoo runs advanced system analyt-

ics to provide early problem detection,

scientific diagnosis, and recommended

courses of action to ensure that surveil-

lance and access control system opera-

tions are fully documented and in contin-

uous compliance. The Viakoo multi-client

platform can be accessed remotely by

authorized personnel from their smart-

phone or PC. Combined with Viakoo’s

experienced technical support team, Via-

koo subscribers have all the resources

they need to effectively detect, diagnose

and solve surveillance and access control

system issues from anywhere 24/7.

Viakoo’s automated surveillance and access data Verification Solution Delivers RMR for Integrators

Proactive service boosts integrators’ bottom line while ensuring maximum efficiency

Page 61: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com59

product showcase

3xLOGIC, Inc. has announced con-

tinued solid uptake of its VIGIL

Central Management (VCM) software,

amid excellent feedback on the deploy-

ment of VCM in the field.

VCM provides security profession-

als with the tools they need to effectively

manage and monitor multiple 3xLOGIC

VIGIL Servers and VISIX cameras over

IP networks. With VCM, users are noti-

fied immediately if there is an issue with

a server or camera connected to their

network. This allows potential problems

to be resolved proactively before a loss

of critical video or service occurs.

BatesSecurityfindsRMR success

Jeremy and Bryan Bates, owners of

Bates Security (and Sonitrol of Lex-

ington, KY and Jacksonville, FL), are

among the most successful to date in im-

plementing VCM as a managed service

offering for their customers. “We don’t

sell systems unless there is a full-service

maintenance contract,” explained Jer-

emy Bates, “With 3xLOGIC’s VCM as

part of that system, we offer a whole new

level of service, a true managed service.

Now, we know when a camera is down

before the end user does. Unlike in the

past, when you found out a camera was

malfunctioning because you had no

video of that recent incident you really

needed to see.”

Bates Security has 176 3xLOGIC

video surveillance systems and count-

ing that are utilizing the VCM managed

service offering. “VCM as part of our

managed services significantly strength-

ens our value proposition,” said Bryan

Bates, “Our video systems also include

a monthly investment. This monthly in-

vestment provides real value to the cli-

ent because of the work Bates Security

does every day to deliver the best pos-

sible video solution. Clients can rest

assured that their cameras and video

servers are functioning and that they

will deliver video when it matters most.

The monthly investment also covers the

equipment, should it have problems, and

even replaces a camera with the latest,

best model if it can’t be repaired.

VCMfacilitatesdeepercustomerrelationships

VCM as part of a managed ser-

vices agreement sounds great in

theory, but the Bates have repeatedly

seen it in action. One customer had ac-

cidently turned off a camera that pro-

vided views of a parking area. VCM

sent an alert, and a Bates Security

administrator contacted the end user

to get the camera back online. Within

a day or two, the video surveillance

system caught two perpetrators throw-

ing a brick through a car window in

the parking area and making off with

3xlogic Vigil central Management software creates solid rMr for integrators

Integrator partners report growing results for VcM in exceeding end user needs

Page 62: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com60

product showcase

a purse. The video images were quite

clear, and the police were able to ap-

prehend the suspects based on the

video evidence. Without this level of

technology and service, it’s likely the

camera would have remained down

and the incident left unrecorded.

“If that end user had bought his sys-

tem off the internet or from an integrator

not providing full service, he’s probably

got nothing,” said Jeremy Bates, “Be-

cause he didn’t invest in a total solu-

tion.” Bryan Bates added, “VCM gives

us many opportunities to ‘touch’ the cli-

ent, to provide consistent value, to have

a conversation and stay current with

their needs and mindset. It’s a very valu-

able tool for us.”

The 3xLOGIC VIGIL Central Man-

agement software’s main end user ben-

efits include:

● VIGIL server, NVRs and VISIX

camera health monitoring.

● E-mail/ text alerts of health moni-

toring events (number of recording

cameras, hard drive storage, proces-

sor utilization).

● User account and permissions man-

agement.

● Remotely deployable VIGIL Soft-

ware Suite updates.

● Back-up and storage for server con-

figuration files.

Proxim Wireless Corporation, a

pioneer and global leader in point

to point (PtP) and point to multipoint

(PtMP) wireless systems and advanced

Wi-Fi, introduces the Tsunami MP-

10150-CPE and MP-10100-CPA. This

small, high capacity subscriber unit is

ideal for installations where space is

limited such as busses or metros, but

performance is a must. Combined with

Proxim’s Fast Connect, this new release

brings 200Mbps to mobile off load ap-

plications.

The Tsunami 10100 CPE and CPA

support all the advanced features of the

larger and more powerful 10100 series

Base Station Units and Subscriber Units

with features such as a high speed pro-

cessor for improved packet performance,

support for Jumbo Frames, pass through

on 1588V2 timing protocol, high power

output and a ruggedized IP67 enclosure.

The CPE and CPA are offered with a

proxim wireless introduces the tsunami® 10100 cpe and cpa

small form factor, high performance client device

wide range of throughput: 50, 100, 150

and 200Mbps. Moreover, each model

can be license upgraded to higher capaci-

ties as network demands grow over time.

All of this advanced functionality and

high speed throughput is contained in

a small, robust and compact size of less

than 5x8.62x2.58 in (126x219x65.5mm)

making it one of the smallest 200Mbps

devices on the market.

The CPE version comes with an in-

tegrated 16dBi antenna, while the CPA

supports two surge protected N-Type

connectors for any dual polarity exter-

nal antenna. Having an external antenna

makes it easier for integrators to posi-

tion this unit in mobile platforms such as

buses or metro rail platforms where the

equipment space is often times limited to

a small cabinet. This facilitates mount-

ing the antenna on the roof with the unit

down below, and it also allows deploy-

ment with specifically designed mobile

antennas. Furthermore with support for

12V powering, the Tsunami 10150 CPE

and 10100 CPA can be deployed in cars

or powered by wind or solar.

In keeping with Proxim’s commit-

ment of at least two generations back-

wards compatibility, Tsunami 10100

CPE and CPA are interoperable with

Tsunami 8200 platform as well as the

Tsunami 800 series product line.

“The Tsunami MP-10150-CPE and

MP-10100-CPA continue Proxim’s lead-

ership in offering more performance for

the money, and with this product release

does so in a small form factor that opens

up numerous additional applications,”

said Greg Marzullo, CEO and President,

Proxim Wireless, “The 10150 CPE is

a lead product in several planned ad-

vanced IOT 3.0 solutions which will be

launched this year enabling us to better

support intelligent transport applica-

tions.”

Page 63: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com61

product showcase

needed.

QNAP recommends high-perfor-

mance Enterprise NAS models for pro-

viding OpenStack storage. This range

includes the Enterprise ZFS NAS that

features dual active-active controllers and

the QES operating system that supports

high-availability, near-limitless snap-

shots, data de-duplication, and compres-

sion. Other recommended NAS include

the TES-1885U and TES-3085U. Pow-

ered by Intel® Xeon® D processors, they

are capable of running either the QTS or

QES operating system on a single rack-

mount NAS and acting as an ideal backup

NAS for Enterprise ZFS NAS.

OpenStack Ocata has a projected re-

lease date of February 22, 2017.

security and added convenience Featured in Upgraded KeyWatcher®

touch system at ice totally gaming 2017system more attractive to technology-based gaming entities

QNAP® Systems, Inc. has an-

nounced that the QNAP Cinder

Driver has been verified by OpenStack®

to support the upcoming ‘Ocata’ ver-

sion. Businesses can easily configure

QNAP NAS as block storage supporting

their OpenStack environment to build a

cost-effective hybrid cloud solution.

“The support for the OpenStack

Cinder Driver enables QNAP's enter-

prise-grade NAS to be an integral part

of OpenStack ecosystems, providing

businesses with a flexible, easy-to-use,

and low-cost storage solution,” said Wa-

terball Liu, Product Manager of QNAP.

With the QNAP Cinder Driver users

can easily implement QNAP NAS for

OpenStack to attain highly-available and

secure storage for on-site data, as well as

to protect virtual machine data by using

snapshots for data recovery whenever

Qnap cinder driver supports openstack ocata, providing Block storage and snapshots

Morse Watchmans, the industry

leader in key control and asset

management systems, brought out-of-

the-box solutions to ICE Totally Gaming

2017 with its recently enhanced Key-

Watcher® Touch. New features present-

ed at their booth included security and

notification upgrades, plus ease-of-use

improvements that make the key man-

agement system even more flexible and

useful in fulfilling the safety and secu-

rity needs of resorts and casinos.

Page 64: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com62

product showcase

“Visitors to this

show understand

the need for an in-

creased degree of

component security

to ensure system in-

tegrity,” said Fernan-

do Pires, VP of Sales

and Marketing,

Morse Watchmans, “We have bolstered

the security features of our KeyWatcher

Touch to meet these demands, allowing

users to be confident in implementing

the system throughout the enterprise.”

Multiple new security features pro-

tect the system from cyber breaches via

the network. With the firewall enabled,

all incoming traffic is ignored unless it is

on the specific ports the system requires

for network and server communication.

The data between the KeyWatcher Touch

and the KeyWatcher Touch Server can

now be encrypted with AES256 technol-

ogy via a pre-shared key that is definable

on a site-by-site basis.

For further operational convenience,

a number of additional upgrades have

been implemented. KeyWatcher Touch

Server service can now run under a do-

main user account. Windows authentica-

tion is supported for SQL, while server

logins eliminate the need for the IT de-

partment to add SQL users to the SQL

server for the purpose of authentication.

The KeyPro™ III software import utility

has been revamped to make it easier to

use; for example, imports can now be

performed as needed so that the user does

not have to complete them all up front.

According to Pires, day-to-day user

conveniences have been upgraded in-

cluding the ability to replace keys from

TrueTouch™ key tracking software using

the SmartKey reader. A new notification

that allows for users to be notified when

an overdue key has been returned is also

included, as well as notifications for dual

and triple user removals/ returns. All re-

ports in TrueTouch now support being

saved/ viewed as a PDF, or saved as a

CSV file.

“With these updates, KeyWatcher

Touch makes key control more attractive

to the casino, bingo and resort sectors of

the gaming industry,” said Pires, “It adds

to the ways users can benefit from a key

management system investment.”

Barco further optimizes the Visual experience of super-narrow Bezel tiled lcd Video walls

Barco’s family of narrow-bezel LCD

video walls couple the traditional

advantages of tiled LCD video walls –

excellent image quality, minimum space

requirement, and an advantageous price

setting – with innovations to ensure

availability and optimize TCO. The new

OverView HVD5521 now joins this

portfolio, with a screen diagonal of 55”

and a brightness of 700 cd/m². Its ex-

tremely narrow total bezel width of only

1.8 mm (measured between screens)

enhances the visual consistency of the

video wall, making it better suited for

content that spans multiple displays.

Tailored for use in critical environments

Because control rooms are highly

critical environments, uptime of all

components needs to be assured. This

means that not only must component

failure be avoided, but also that mainte-

nance time must be kept to a minimum.

To counter the classic problem with

color and brightness level shifts in LCD

video walls, Barco developed the unique

Sense X automatic color and brightness

calibration system based on integrated

color sensors. This technology automati-

cally balances the video wall at all times,

eliminating the need for expensive and

time-consuming manual calibration.

This not only optimizes uptime, but also

contributes to the wall’s low TCO.

Furthermore, the optional redun-

Barco announces a new product in its super-narrow bezel LcD video wall portfolio. the OverView HVD5521 is Barco’s most advanced tiled LcD video wall to date, offering operators a stunning

visual experience. Designed for use in control rooms, the HVD features some unique innovations that boost reliability, lower total cost of Ownership (tcO), and minimize maintenance needs

Page 65: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com63

product showcase

dant external power supply automati-

cally switches to a new unit if one

should fail, eliminating downtime due

to power supply failure. And because

the power supply is located remotely,

its maintenance can be performed

without disturbing operations. Plus,

any staff member (not only certified

technicians) can replace a defective

power supply unit − so this system also

reduces labor cost.

Near-seamless, great colors, high brightness and reliability

“The trend in the LCD

video wall market

is toward the narrowest

bezel possible,” says Pietro Capret-

ta, Product Manager at Barco, “And

the OverView HVD accelerates this

trend. We are very proud of this prod-

uct, which demonstrates our

continued commitment and

investment in the tiled LCD

video wall market. In ad-

dition to the near-seamless

canvas, the great colors and

high brightness and reliabil-

ity make this display stand out. It’s the

perfect addition to our LCD video wall

portfolio – and will further expand our

footprint in this market.”

Ramp Up the Security and Efficiency of industrial networks with the oncell g3150a-lteWireless connections bring conven-

ience to industrial networks, but

they also increase security risks, espe-

cially during data transmissions. Moxa’s

new LTE cellular gateway, the OnCell

G3150A-LTE, enables high-speed data

transmission without compromising net-

work security. The OnCell Central Man-

ager tool extends the capabilities of the

cellular gateway to provide fast deploy-

ment as well as powerful monitoring and

security functions.

In line with the products of the On-

Cell series, this LTE cellular gateway is

designed for rugged operating environ-

ments, including remote locations. Dual

SIMs together with the GuaranLink

function, which automatically re-reg-

isters the device with a base station to

establish a new cellular connection when

the signal goes down, ensure connection

continuity. The built-in power isolation

and dual power inputs protect the device

against EMC and ensure reliable con-

nectivity. The LTE gateway can operate

reliably at extreme temperatures, which

makes it ideal for outdoor deployments.

Enhanced security to reduce data transmission risks

To prevent cyber attacks on your net-

work and block unauthorized access

of critical data over the cellular network,

Moxa’s new LTE cellular gateway pro-

vides secure VPN communication capa-

bilities in both master and client modes.

Support for site-to-site security protocols,

such as OpenVPN, GRE, and IPSec, help

you easily establish secure connections be-

tween two networks. In addition, the gate-

way complies with the technical require-

ments of the IEC 62443-4-2 cybersecurity

standard to provide enhanced security.

Designedforefficiencyin long-distance applications

A cellular network is a perfect solu-

tion for device connectivity in hard-

to-reach areas where wiring is expensive

or complicated. However, managing re-

mote industrial devices continues to be

a challenge for most operators. Moxa’s

OnCell Central Manager tool, available

at no cost with the OnCell cellular gate-

way, facilitates fast deployment through

mass configuration of a large number

of cellular devices, and remote device

maintenance. Network operators can

use this tool to remote-

ly upgrade firmware

on devices and rec-

tify faulty devices by

sending SMS control

commands to remotely

reboot the gateways.

The cellular gateway

provides built-in inter-

faces for both Ethernet and

serial connections, which is convenient

for implementing converged networks ef-

ficiently and with ease.

OnCell G3150A-LTE highlights● VPN secure connection capabil-

ity with IPSec, GRE, and OpenVPN

protocols.

● 3-in-1 serial port for serial data trans-

mission over LTE cellular networks

to enable easy data acquisition.

Page 66: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com64

product showcase

KX-HNC800 side KX-HNC800 front KX-HNC800 front shutter

● Free OnCell Central Manager tool

for quick deployment and remote

management of devices.

● Dual SIMs for cellular operations

backup coupled with Moxa’s Guar-

anLink technology enables cellular-

link redundancy.

● Power isolation design for better de-

vice protection against harmful elec-

trical interference.

● Industrial-grade design with dual-

power inputs and built-in DI/ DO.

Panasonic has announced the new

KX-HNC800EW, a Full HD indoor

camera that protects your privacy. Fea-

turing a pre-record function, you can

now capture more footage than other

home cameras, and by using its manu-

ally sliding shutter, avoid recording all

those private family moments.

Record everything you want to – nothing you

don’t

Through its manually

sliding shutter, the

new HD indoor camera al-

lows users to control when

the camera records. This

means that owners can

quickly and easily cover

the camera and micro-

phone to suit any occasion

they may not want to re-

cord, such as when enter-

taining guests.

Nevermissimportantfootage

For comprehensive, accurate video

recording, the KX-HNC800EW

includes a pre-record function. Image

processing begins two seconds before

the camera’s sensor activates the record-

ing process, capturing even more im-

portant footage

than ordinary

home cameras.

A perfect solu-

tion for keeping

an eye on pets

in the home,

animal owners

will never miss

a moment. It’s

now possible

to view and re-

cord all those

cute and funny

moments both

instantly and easily in Full HD. The

camera also allows for two-way com-

munication via the Panasonic app using

its optimised microphone.

Sync seamlessly with otherPanasonicSmartHome devices

The Panasonic KX-HNC800EW is

a stand-alone camera which also

syncs seamlessly to work with Pana-

sonic’s wireless hub, indoor/ outdoor

cameras, smart plugs and other sensors

and components in the Panasonic Smart

Home System.

It also offers wireless monitoring with

optional push notifications for up to eight

smart devices when motion is triggered.

Sharp,smoothrecord-ingsthatcaptureanentire room

The single Panasonic KX-HNC800EW wide angle lens provides full-room

coverage with its 142-degree diagonal wide-angle view. Exceptional Full HD video is recorded, even in low light, with a fast-focusing lens for sharper image ad-justment to capture smooth, movie-quality videos at 30 frames per second.

Full HD (1080p) video can be record-ed automatically onto a microSD/ SDHC/ SDXC card or a smart phone/tablet, mak-ing it possible to achieve a recording time of up to 145 hours. Footage captured can be played back by simply removing the microSD card from the camera and insert-ing it into your chosen device.

panasonic sets new security standards in smart Home cameras

Page 67: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com65

360VisionTechnologyIn-troducesEclipseHDStain-lessSteelExtremeLowLightCamera

360VisionTechnology,theleading

UKCCTVdesignandmanufacturing

company,continuestoexpandtheir

camerarange,withtheadditionof

thenewEclipseHDStainlessSteel

colour/monocamera

Manufactured from stainless steel

316L, Eclipse HD Stainless Steel

features 1080p high definition ultra-low

light Sony STARVIS camera module

technology, and is IP65 certified to pro-

vide reliable scene coverage and opera-

tion in the most challenging of environ-

ments and applications.

The 24V AC/ DC or PoE powered

Eclipse HD Stainless Steel can deliver

two simultaneous video streams up

to 1080p (25/30fps), and performs in

extreme low light conditions deliver-

ing useable monochrome video images

down to just 0.0008 lux.

Featuring 30x optical zoom, the

new addition to the 360 Vision camera

range is ONVIF ‘S’ compliant and SDK

compatible for easy system integration

and control via popular VMS plat-

forms. Additionally, built in EDGE re-

cording is available with 128 or 256Gb

on board storage, with continuous/ FTP

upload/ network loss/ alarm scheduled

recording available as an option to on-

board storage.

Further options include dual white

light and Infrared (IR) LED Sirius light-

ing technology. The white light option

delivers up to 60m of light for colour

video at night, with narrow, medium and

wide-angle lenses for maximum adjust-

ability from 9 to 45 degrees of coverage.

A choice of standard IR 850nm or covert

940nm is available to suit specific light-

ing requirements.

PreventionAgainstTerror:MSSScreeningVehicleSetsaNewStandard–GeutebruckProvidesaVideoSolution

Oktoberfest,Carnival,Christmas

markets,orsportingevents:Pro-

tectingpublicspaces,eventsand

facilitieshasanentirelynewlevelof

urgencyduetotheglobalthreatof

terrorism

MSS (Mobile Screening Solutions)

is a newly established security

consortium that addresses this challenge

by developing a unique, fully equipped

screening vehicle as a mobile check-

point (prevention tool).

Geutebruck is a premium partner of

MSS and equips it with video solutions.

With the increasing threat of acts of

terror and violence, it becomes ever more

important to protect crowds of people.

The greatest risk emanates from bomb at-

tacks, positioned either on the attacker’s

body or placed in a vehicle, and from

hidden weapons. They need to be tracked

down before they can reach critical areas

with large numbers of people.

With the MSS screening vehicle,

the vision of a fully integrated mobile

security concept becomes reality. As a

mobile security center, it carries inno-

vative detection and screening equip-

ment, including metal and liquid explo-

sive detectors.

People and baggage are scanned in

the vehicle through walk-through slots

and they can also be connected with mo-

bile scanners outside the vehicle.

This all happens in real-time! All ac-

Page 68: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com66

tivities, whether inside or outside the MSS

sprinter, are visualized using video secu-

rity solutions delivered by Geutebruck

specifically to meet these requirements.

GJDAcquiresEmbsec’sProd-uctTechnologyandTheirIntel-lectualPropertyRights

GJD,oneoftheworld’sleading

manufacturersanddesignersofpro-

fessionalexternaldetectorequipment

andLEDilluminatorshasannounced

thatithassignedanagreementto

acquirefromEmbsecAB,aSwedish

R&Dhouse,alloftheirinternetpro-

tocol(IP)andlasertechnologyplus

allrelatedintellectualpropertyrights

The IP technology will be integrated

into GJD’s D-TECT® detector and

Clarius® LED illuminator product rang-

es to provide automated and digitally

connectable security solutions.

Embsec’s laser scanning and time of

flight technology solutions will position

GJD as a leader in the field of laser de-

tection. These products are proving very

popular and provide extremely accurate

detection for high risk security applica-

tions. The external laser detectors will

be manufactured in-house at GJD’s UK

factory under the Laser-Watch® and

vFence® trademarks.

Traditional ‘analogue’ security and

lighting systems have been the most

popular choice for a variety of applica-

tions for decades. In 2016, the Internet

of Things (IoT) exploded into the secu-

rity world. More and more companies

are looking to seamlessly connect their

products (security or otherwise) to the

Internet for remote diagnostics, pro-

gramming and control applications. The

purchase of Embsec’s IP products, soft-

ware and technology allows GJD to of-

fer a fully integrated IP solution, with all

products being manufactured in-house

at GJD’s head office in Heywood, Great-

er Manchester.

One of the major advantages of hav-

ing a GJD security device connected via

the internet is that the high-speed remote

access permits full control and diagnostics

at anytime from anywhere in the world.

The IP technology will complement

GJD’s product range instantly. It will pro-

vide installers, specifiers and consultants

with a ‘one stop shop’ for IP connected

detectors, alarm devices and LED illumi-

nators for smart building networks.

MxMultiSensefrom MOBOTIX

ThenewMxMultiSenseMxBus

devicefromMOBOTIX,availableas

anindoorandweatherproofoutdoor

model,isanaffordableaccessoryto

increasesecurityinsideandoutside

ofbuildings

The device detects and reports

movements and noise levels and

measures the temperature and illumi-

nation level, and other environmental

information, which can then be used

for individually configurable func-

tions, such as activation of a signal

output at 5°C or 100Lx. All four sen-

sors can be combined as desired (via

event logic).

The compact MxMultiSense has

a very low power consumption of 0.1

Watt. With the same form factor as an

S15 sensor module it is therefore com-

patible with all sensor module mounts

available for wall or ceiling installa-

tion.

MxMultiSense can be used in many

different applica-

tions. For ex-

ample, it can

be installed

in a Dual-

M o u n t ,

Surround-

Mount or

PTMount,

in order to

add a PIR

sensor to the se-

curity system. It can also be installed in

a HaloMount in a suspended ceiling for

use in presence monitoring in rooms.

MxMultiSense performs its func-

tions in a decentralised manner, mean-

ing that it carries them out largely

autonomously with the help of MxMes-

sageSystem (MxBroadcast).

Page 69: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K

March-April 2017 www.malaysiasafe.com67

RedvisionAnnouncesSDKIn-tegrationwithIDISNVRsandVMSSolutions

Redvisionhasannouncedthatits

RV30™ruggedPTZdomecameras

willnowfullyintegratewithIDIS

DirectIP™NVRsandIDISCenter™

videomanagementsoftware(VMS)

Unveiled at Intersec 2017, the inte-

gration allows RV30™ plug-and-

play camera set up using the IDIS Direc-

tIP™ NVRs.

Much of the Redvision IP camera’s

advanced functionality is enabled, in-

cluding variable speed PTZ operation,

for responsive operator control; minimal

joy-stick latency; wiper, IR and white

light illumination by manual switch or

schedule; and programming of multiple

pre-sets and tours. The IDIS DirectIP™

NVRs record the camera’s Full HD, pri-

mary video stream, whilst using its low-

er resolution sub-streams for efficient

control, display and transmission.

IDIS is a specialist, South Korean

manufacturer of video surveillance

equipment.

Billy Hopkins, Technical Manager

of IDIS Europe, explains: “We initially

integrated with Redvision’s RV30™ cam-

eras using the universal ONVIF proto-

col. This worked immediately, with no

additional development work required.

However, Redvision’s firmware and

SDK development tool allowed us to

take full advantage of more advanced

functionality.

IDIS is pleased to add the Redvision

RV30™ to its portfolio. The market-

leading, X-SERIES™ rugged dome is

ideally suited to the tough, hot, outdoor

conditions typical of our Asian and Mid-

dle East market. It’s flat glass, camera

window and wiper allow us to remove

dirt, dust and water.”

SunstoneIPSystemsDevelopsSolarPoweredSecurityforOil-fieldsandRemoteLocations

Theself-sustainingsolutioncombats

thechallengesofdeliveringsurveil-

lanceinharshenvironmentswithout

electricityortelecommunications

Sunstone IP Systems Limited, a fast-

growing security systems integrator,

has designed a patent pending Solar IP

CCTV System (SICS), which delivers

high quality and high definition (HD)

surveillance in remote locations.

SICS was designed in response to

the challenge of delivering wireless

surveillance in remote and corrosive

environments combined with extreme

weather conditions to enable seamless

HD monitoring for high security op-

erations across a wide geographic area,

such as oilfields.

Typically, such environments lack

fixed buildings, power and connectiv-

ity, so it was integral that SICS was de-

signed to be completely standalone, eas-

ily transportable and rapidly deployed.

Completely self-sustaining, SICS

uses a 500w combination of rugge-

dized solar panels, which were custom

engineered for optimum solar angles in

a range of global locations. The energy

from the sun is harvested from the pan-

els and stored in a proprietary harsh en-

vironment battery system, which is de-

signed to withstand deep cycling along

with extremely

high and low

t empera tu re s .

The power gen-

erated from the

solar and battery

system can fuel

any type of IP

camera system,

wireless access

control, telecom-

munications or

LED lighting

system.

In addition,

SICS is fitted

with a system controller, which enables

real-time monitoring of all aspects of

the system, including solar and battery

performance, alongside a GPS location

alert on system threats such as extreme

temperature or snow build up. The solar

controller is vital to the effective opera-

tion of SICS, providing security opera-

tives with diagnostic information and

the ability to completely monitor the

system remotely.

Page 70: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K68

SecurityLink IndiastH-187/5 (1 Floor), Jeevan Nagar Market, Kilokri, New Delhi-110 014, India

Tel: +91 11 2634 2237 • Telefax: +91 11 4282 8080

Reach us onwww.securitylinkindia.com • [email protected]

Page 71: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K68

Page 72: C M Ymalaysiasafe.com/wp-content/uploads/2018/11/MalaysiaSAFE-Mar-A… · c m y 68 c m y . c m y 68 c m y c m y

C M Y K

C M Y K68