sp_1412dgd
DESCRIPTION
SECURITY PRODUCTS 12/2014TRANSCRIPT
-
www.security-today.com
Integrated New Product and Technology Solutions for Security Professionals December 2014 Vol. 18, No. 12
Mobile AppLeveraging human expertiseViakoo quickly detects IP video failures, diagnoses problems and alerts users with vital information to repair any issues. Information refreshes every 20 min-utes. A new mobile app brings this information to users smartphone screens. By leveraging Viakoos proprietary technology and human expertise, users gain critical insight into their video networks behavior, capturing valuable perfor-mance metrics and eliminating missing video. One click connects subscribers
to video infrastructure experts for insight and technical support. Viakoo.Go to sp.hotims.com and enter number 300 for product information.
Video Insight v6 SoftwareDesigned for the education marketThe new Video Insight v6 software is now bundled with MonitorCast-EDU, an enterprise access control application designed for the educa-tion market. Video Insight recognizes the unique security, budgetary and infrastructure challenges faced by educational institutions. The v6 software leverages existing network infrastructure and Mercury-based access control system and provides necessary features to enhance campus security with no additional cost. Video Insight.Go to sp.hotims.com and enter number 301 for product information.
MegaDome 2 Megapixel Cameras Additional features include several enhancementsArecont Vision has added signifi cant enhancements to its all-in-one MegaDome
2 Day/Night megapixel cameras. New features include Arecont Visions STELLAR (Spatio TEmporal Low Light ARchitecture) low light technology, optional on-board
storage up to 32GB via an SDHC card slot; CorridorView capability that allows the cameras image to be rotated 90 degrees for better coverage in hallways and corridors; and an extended ability to scale images to different resolutions to better meet system bandwidth and storage requirements. Arecont Vision.Go to sp.hotims.com and enter number 302 for product information.
CompleteView 4.4With full Samsung analytics supportSalient Systems CompleteView 4.4 supports camera analytics and alarm events for Samsungs product line.The integration supports alarm inputs, tamper detection, video analytics for objects entering, exiting, passing and appearing/disappearing from a region of interest. Along with the above analytics support, CompleteView 4.4 also offers integration with Samsung facial detection and audio detection. Salient Systems.Go to sp.hotimes.com and enter number 303 for product information.
Digital DeterrentNo licensing feesSpeco Technologies NSP NVR with built-in PoE is the only NVR of its kind that provides the ease of an IP setup with the simplicity of an analog system . Other NVRs scan for cameras, but they dont auto register and enroll IP cameras to produce a picture automatically. Also, the NSP NVR is equipped with Digital Deterrent, EZ Networking, EZ search, 2-way audio through smart phone apps, DDNS, no licensing fees and more all in one package. Speco Technologies.Go to sp.hotims.com and enter number 304 for product information.
Middleware for Asset MonitoringIntelli-Track also good for personnel tracking and theft prevention
Transponder and Reader Engineered Systems Inc., together with OSSI, introduces tres Intelli-Track middleware for asset monitoring, person-nel tracking and theft prevention. Coupling the tres Intelli-Track mid-dleware with tres433 Active Tag RFID products allows users to track assets (including personnel) in real time while generating alerts/alarm events when assets enter unauthorized zones, unescorted individuals or assets enter secure areas, personnel or assets go missing from a
monitored area, or even when assets simply go into motion. This product is also customizable and scalable. Transponder and Reader Engineered Systems Inc.Go to sp.hotims.com and enter number 305 for product information.
FLIR Low-Cost ThermalHigh performance at an affordable priceFLIR low-cost thermal cameras provide superior video security day and night. Available in bullet, mini-bullet, and PTZ dome confi gurations with reso-lutions up to 640 x 480, and fi elds of view as narrow as 9. FLIRs low-cost thermal cameras maintain high-quality standards at an economical price, and provide imagery that is unmatched for intrusion detection and alarm assessment. FLIR.Go to sp.hotims.com and enter number 306 for product information.
We care.Staying with you all the way.
www.axis.com/support
Electronic security that secures more business.
Schlage NDE wireless locks with
ENGAGE technology open up a
whole new business opportunity:
more doors. With NDE wireless
locks, you can off er your clients
the bene ts of electronic access
control in interior spaces leading
to higher client satisfaction and,
of course, higher market share.
Learn how to secure more doors at allegionengage.com/sp or call us at (877) 556-1272.
Go to sp.hotims.com and enter 34 for product information.
1214sec_c1_v2.indd 1 11/13/14 10:09 AM
-
Visit www.axis.com/support
We care.Staying with you all the way.
5
Axis Technical Support provides efficient assistance for your Axis product from extended warranties and repair, to our Helpdesk and Chat. With 23 support personnel based locally in North America speaking 7 languages, and over 90 supportpersonnel across the globe speaking more than 15 languages, you can rest assured that youll receive assistance wherever you are, whenever you need it.
ChatFAQ
Helpdesk
Phone
Warranty
RMA Extended Warranty
Distributed by:
Count on it.
Go to http://sp.hotims.com and enter 9 for product information.
Untitled-8 1 10/28/14 12:52 PM
-
Milestone Systems U.S.Tel: 503 350 1100
Knowledge. Students at the world-leading Warsash Maritime Academy in the UK hone their seafaring skills through a realistic engine room
simulator. Teachers use Milestone XProtect Professional software to monitor and listen to students from a separate room.
These recorded two-hour training sessions help students graduate with a rst-class education. Proving
again Milestone can solve problems that are more than security.
Milestone XProtect is the worlds leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as video analytics. Which means your possibilities are unlimited and you can keep your security options open.
See our new products and the new ways to use XProtect at: www.milestonesys.com
Morethan security
Go to http://sp.hotims.com and enter 39 for product information.
Untitled-5 1 11/5/14 3:38 PM
-
4 1 2 1 4 | S E C U R I T Y P R O D U C T S
www.security-today.com CONTENTS DECEMBER 2014
FEATURES
Industry Trends 14Nostalgia has No Place in Video SurveillanceWhy IP video will eventually supplant analog technologyBy Fredrik Nilsson
Growth and Trends 226 Trends Impacting Access Control and the Overall Security MarketIncreased emphasis placed on interoperability and total cost of ownership in security purchasing decisionsBy Jeremy Krinitt
Growth and Trends 28Me Too ProductsBeing wise about the products you present to end usersBy Ian Johnston
Utility Security 44Substation Security ChallengesApplying smart thermal technology to prevent intrusionsBy John Romanowich
Internet of Things 48Embracing the Internet of ThingsOpportunities and implications for security and beyondBy Jeremy Brecher
PRODUCT SECTIONS
New Product of the Year 32
Readers Choice 46
DEPARTMENTS
Industry Focus 8Planning for the FutureBy Ralph C. Jensen
Industry Vertical 10The Truth about FisheyeDewarping and how to use itBy Thomas Carnevale
Top Picks 12
New Products 50
Advertisers Index 57
Industry Professional 58Never AgainBy Ralph C. Jensen
t 2014 READERS CHO
ICE tt 2014 READERS C
HOIC
E t
SECU
RITY PRODUCTSSE
CU
RITY PRODUCTS
Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.
Copyright 2014 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to Permissions Editor, c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254
The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the readers sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.
1214sec_004_TOC_v2.indd 4 11/13/14 11:29 AM
-
Actual images
2014 Sony Electronics Inc. All rights reserved. Reproduction in whole or in part without written permission is prohibited. Features and specications are subject to change without notice. Sony and Exmor are trademarks of Sony. ImmerVision Enables and Panomorph are trademarks of ImmerVision.
Say farewell to poor resolution at the image periphery. Say hello to Sonys SNC-HM662. Tightly integrating Sonys 5 megapixel Emxor CMOS sensor to an ImmerVision Enables Panomorph 360 lens that enables up to 30 percent more pixels than a traditional sheye lens, the camera minimizes blind spots. Youre also free to create multiple view windows with full electronic pan, tilt and zoom in real time or after the fact. So you can track, detect and analyze as never before. Experience the SNC-HM662 hemispheric view camera for yourself. And leave the sheyes to the sh.
Learn the Five Essentials of Surveillance Cameras at sony.com/security.
Trade your sheye for a birds eye.
s.
Go to http://sp.hotims.com and enter 2 for product information.
Untitled-6 1 10/21/14 3:39 PM
-
6 1 2 1 4 | S E C U R I T Y P R O D U C T S
Another One in the Books
As 2014 comes to an end, Id like to take the time to say thanks to every-one who contributed to our expert quotes, feature articles, blogs, Online Exclusives, and the list goes on. Our magazine and Website would not be the same without you. The coming
year holds great promise, and I cant wait to discover what the security industry has in store for all of us. As always, if youd like to submit an Online Exclu-sive or if you have some new ideas, please feel free to give me a call or send an email. I look forward to working with you in 2015.
Our REACTION blog addresses current events and receives great feedback from our active online community. Wed like to invite you to check out our recent posts and share your thoughts.
If youre interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.
Best Regards,
Lindsay Page
Online Exclusives
Key Management Systems Enhance Key and Lock ApplicationsBy Fernando Pires
Keys and locks are one of the most reliable and effec-tive physical safeguards available in todays security marketplace. They offer both prevention and protec-tion, are easy to install and maintain, and have a mini-mal investment cost. Advances in key/lock design and technology have helped to reduce security issues such as key duplication, key bumping and lock picking.
Using Bluetooth-Enabled Devices as the Key to Remote MonitoringBy Steve Spatig
Bluetooth technology is commonly used in a variety of applications to sync intelligent devices such as smartphones, wireless headsets and health trackers, to networked computers. As the desire to con-nect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security as well.
The Rise of the Machines: M2Ms Role in Transforming Business and SecurityBy Rod Montrose
Machine-to-Machine (M2M) devices and their in-nate power to communicate are transforming the way every business in every industry operates today, prov-ing to save companies time, money and resources.
http://security-today.com/01131
Recent Headlines
911 Tapes Reveal Teacher Tried to Stop Gunman
Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web
The Future of the Connected Home with Z-Wave
Key Management Systems Enhance Key and Lock Applications
Cyberespionage Group Targets Execs through Hotel Networks
http://security-today.com/news
Upcoming Webinars
Access Granted: Access Control Checklist for 2015Join speakers from Avigilon as they provide you with actionable tips that will allow you to take your access control system to the next level in 2015.
4 Steps to Reduce Third-Party Personnel RiskDiscover a systematic process for recognizing and minimizing identity-related personnel risks.
Meeting the Challenge of Secure Visitor Management for Secure Government FacilitiesJoin us for this FREE webinar as we detail the rea-sons why an enterprise visitor management system is absolutely necessary in todays government facilities.
To view these Webinars at any time, please visit http://security-today.com/webinars.
REACTION Blog Recent Posts
Recent Survey Shows the Internet as a Double-Edged Sword
Companies with Protected Data will Look to Spend More on the Cloud
Armed Security Guard Fired After Riding Elevator with Obama
Sensor Records Each Shot Fired from Police Officers Gun
Members of our staff and guest bloggers take advantage of REACTION to add their own perspectives on a broad range of security topics and issues. If youd like to be a contributor, please contact Group Social Media Editor, Ginger Hill at [email protected].
Online Communities
Follow us on Twitter: www.twitter.com/SecProds
Become a fan on Facebook:http://www.facebook.com/secprodonline
Pin with Us:http://pinterest.com/securitytoday/
Go to sp.hotims.com and enter 14 for product information.
1214sec_006_eTOC_v2.indd 6 11/13/14 2:19 PM
-
nounhaving or serving a utilitarian purpose; capable of serving the purpose for which it was designed.
POE Powered
IP Based Architecture
RFID Support/Smart Cards
Access Control/Door Strike Control
Real Time Video Notifi cations to Smart Phones
www.icrealtime.com866.997.9009
The doorbell redefi ned.
Go to http://sp.hotims.com and enter 28 for product information.
Untitled-2 1 10/21/14 1:18 PM
-
INDUSTRYFOCUS By Ralph C. Jensen, Editor-in-Chief
8
www.security-today.com
Volume 18, No. 12
EDITORIAL STAFF
Editor-in-Chief/Associate Publisher Ralph C. Jensen
E-news Editor Brent Dirks
Senior Editor Lindsay Page
Content Development Matt Holden
ART STAFF
Art Director Dale Chinn
PRODUCTION STAFF
Director, Print and Online Production David Seymour
Production Coordinator Teresa Antonio
EDITORIAL ADVISORY BOARD
Thomas Carnevale, president/CEO, Sentry 360
William Crews, President/CEO, Security & Resilience Consulting, LLC, Houston
Merlin Guilbeau, Electronic Security Association, Irving, Texas
Robert Hile, director of strategic accounts, Sure View Systems
Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston
SALES
Randy Easton 904-261-5584
Brian Rendine 972-687-6761
Sam Baird +44 1883 715 697
Jane Dai +86-755-26289889
Peter Kao +886-2-2949-6412
SECURITY, SAFETY, AND HEALTH GROUP
President & Group Publisher Kevin OGrady
Group Circulation Director Margaret Perry
Group Marketing Director Susan May
Group Website Manager Scott Newhouse
Group Webinar Administrator Tammy Renne
Group Social Media Editor Ginger Hill
Chief Executive Offi cer Rajeev Kapur
Chief Operating Offi cer Henry Allain
Senior Vice President & Chief Financial Offi cer Richard Vitale
Executive Vice President Michael J. Valenti
Vice President, Erik A. LindgrenInformation Technology & Application Development
Vice President, Event Operations David F. Myers
Chairman of the Board Jeffrey S. Klein
REACHING THE STAFF
Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.
E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]
Dallas Offi ce (weekdays, 8:30 a.m. 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254
Corporate Offi ce (weekdays, 8:30 a.m. 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311
Planning for the FutureBusiness planning for 2015 likely started a long time ago. I know it has for the publishing in-dustry, as we keep our editorial calendar up-to-date each quarter. It wont be long before the fi rst quarter of 2016 is updated on our website.
The same is true for the security industry. Planned upgrades and new products have been released throughout the year. December, however, is the per-fect time to review what some of the industry analysts have to say about the coming year.
The good news is that the physical security market continues to grow.
According to IMS Research, there is still strong market demand in what is described as an increas-ingly competitive physical security equipment and services industry. The market reached $120 billion in revenue during 2013, which refl ects a 10.8 percent increase, compared to 2012. The United States re-mains the largest country with $6.5 billion spent on equipment. China, however, is closing that gap each year, where one in every $5 spent on physical security equipment in Asia is for a government building, not including state-led facilities and installations such as airports or infrastructure.
As global economic conditions continue to im-prove and budgets slowly increase, the physical secu-rity industry continues to perform strongly across the world, the IMS Research report stated. Growth in the number of projects employing different types of physical security equipment as a single solution is also increasing, often managed through the same platform.
Physical security remains a competitive market, and while global revenues for equipment and services continue to increase, expectations that the industry supply market would begin to consolidate seem pre-mature. The top 15 manufacturers and service pro-viders accounted for only 22 percent of the market in 2013, a decrease of 3 percent from just a year ago. In fact, no one can boast more than a 5 percent market share, showing how fragmented this growing industry truly is, and that there are high levels of competition.
Asian-based manufacturers are gaining market share outside of their domestic markets. Last year, four of the top 10 equipment manufacturers globally were in Asia. They have improved product quality and are starting to expand to new markets. This also means increased price pressure on the American and EMEA markets. Price pressures are not strong enough to outweigh the increases in general market demand, so there is consistency for strong growth in the foresee-able future, especially in the following sectors:
Ethernet switch manufacturers. There are new, fast-growing markets where Ethernet switch manufactur-ers can diversify. Data from ISH Research shows that
606,000 Ethernet switches were sold for use in video surveillance deployments in 2013. This is but a small portion of the Ethernet switch world right now.
The forecast for Ethernet switches is that by 2018, there will be some 1.6 million units sold, representing a much larger portion of the market. IHS estimates that 24 port switches are the most widely-used in video surveillance applications and Ethernet switches used in video surveillance revenue are estimated at $188.2 million.
A number of Ethernet switch manufacturers have been quick to capitalize on the growth in this market and have started producing solutions tailored specifi -cally for video surveillance, IMS Research reported. Two such notable moves were the launch of Avayas Fabric Connect solution, and the strategic partnership between Extreme Networks and Milestone Systems.
Smartcards. Global shipments of smartcards are expected to rise by 2.1 billion from 2014 through 2019. Smartcard shipments in 2019 will rise to 10.9 billion units, up from 8.8 billion in 2014.
The key end-user sectors that will drive growth over the next fi ve years include payment and bank-ing, e-government, healthcare and transportation, said Don Tait, senior digital and ID market analyst at IHS. The market will expand despite declines in subscriber identifi cation cards (SIM), which are used in mobile phones. Slowing growth in mobile phones will cause SIM card shipments to fl atten or decline.
Asia also plays a key role in the overall smartcard market. China, India and Indonesia will be a huge part of the growth of the smartcard market over the next fi ve years, and electronic passports are contribut-ing to high volumes in the Asian market. The Asian-Pacifi c region accounted for the highest number of ePassport shipments in 2013.
PERS. The North American personal emergency response systems (PERS) market is forecast to grow from $700 million in 2014 to $1.5 billion in 2019. The main market driver in this vertical is a growing elderly population, increasing the use of mPERS. However, as the United States moves away from the POTS-based communication in the home, mPERS will grow substantially.
It seems to me that 2015 is the year weve all been waiting for since 2008, when the economy began a nose dive. Overall unemployment in the United States is declining, and with more people back to work, there is a greater need for high-tech security systems.
Many companies have been planning for the worst and hoping for the best. It seems the time to hope is over; the time to perform is now at hand.
1214sec_008_IndFocus_v2.indd 8 11/13/14 9:57 AM
-
Video Insight v6 now withaccess controlFREE!The new Video Insight v6 is now bundled with MonitorCastEDU, an enterprise access control application designed for the education market. Video Insight recognizes the unique security, budgetary and infrastructure challenges faced by educational institutions. The new v6 leverages existing network infrastructure and Mercury-based access control system and provides necessary features to enhance your campus security with no additional cost.
.H\%HQHWVRI0RQLWRU&DVW('8
Unlimited scalability No limit for the number of doors, administrators, or simultaneous connections No hardware purchase required from Video Insight Its FREE of charge with Video Insight Server v6 or Advidia Cameras (each camera license is bundled with a door license.) Support Mercury access control boards No client or server licenses required Zero recurring access control fees with current Video Insight SUP It runs on your existing Video Insight Server
For more information visit us at: www.video-insight.com/access-control.phpGo to http://sp.hotims.com and enter 24 for product information.
Untitled-2 1 11/7/14 10:49 AM
-
1 0 1 2 1 4 | S E C U R I T Y P R O D U C T S
As most in the video sur-veillance industry know, traditional video sur-veillance cameras have an inherent fl aw: blind
spots. For example, if a fi xed fi eld-of-view camera is pointed left and an inci-dent occurs on the right, then the camera is useless. So, couldnt we just double or triple the number of cameras used in ev-ery cafeteria and parking lot in order to capture every angle? Sure, but then users are forced to incur extra hardware costs, installation costs, software licensing and added maintenance expenses.
With demand for comprehensive se-curity increasingwhile corresponding budgets decrease or stay the samethat is not a practical solution. This is why Sentry360 has made obtaining an afford-able, true, 360-degree-view a technology that is accessible to the masses. Look-ing at a pure fi sheye image might be a novel perspective, but when it comes to a security professional investigating, it becomes something to decipher. A 360 fi sheye allows the curved fi sheye affect to become corrected, like looking at a normal camera through a process called dewarping; however, this is only half the battle. Lets put this into context relative to the current state of the market.
The MarketThere has been a big boom in the past few years with manufacturers producing cameras with fi sheye lenses. The reality is that many of these products came to market to fi ll a gap in said manufac-turers product-line, which often times is an imitation not an innovation. Many in the 360-degree sector believe that all they have to do to achieve full coverage is at-tach a fi sheye lens to an IP video camera andvoila!they will receive full cover-age. Not so. If you dont have the ability to fi rst dewarp then allow full PTZ in live and recorded 360-degree fi sheye images, then the result is a product that may be misleading to an end-user.
The majority of these recent entrants to the fi sheye market do allow dewarp-ing through a common DSP chip manu-facturer Ambarella, but theres a catch: The user must dewarp the stream in-
camera coming into the VMS which is typically 20 to 30 percent of the overall fi sheye, leaving 70 to 80 percent unre-corded. To reduce blind spots, the user can repeat this process, adding multiple dewarped streams from the camera at different angles, but this could, in some cases, increase bandwidth and storage, or add software licenses and increase power consumption from the camera. Through-out this restricted process, it eliminates the ability to PTZ the dewarped single stream view in recorded video, which should ultimately be the sole purpose for choosing this breed of technology.
The following will help users under-stand best practices, positioning and applications for this technology with one common goal: to capture the larg-est amount of information with the least amount of cameras (sensors) from a sin-gle vantage point.
The Application: Ceiling Mount with 360 Technology
This is the North, South, East and West approachwith everything in between. 360cameras are designed to capture a full half of circle and to be mounted on the ceiling looking straight down so it can capture, record and reproduce cor-rected perspective PTZ windows in re-corded or live video. The optimization of the Sentry360 dewarping technol-ogy reduces the amount of total single fi eld-of-view cameras you will need to cover heavy traffi c or open areas within schools, banks, retail, assembly lines, busses, trains, airports and more.
The DOs:1. Mount in a ceiling using a surface-
mount mini dome or fl ush-mount (dis-creet accessory) with a drop ceiling.
2. Make a clear decision at what radius
image quality is needed. Think de-tection vs. identifi cation. Results will vary depending on how high the cam-era is mounted and how far away the subject is from the camera.
3. Plan for evenly distributed lighting. If part of environment is poorly lit that section of the image will be affected.
The DONTs:1. Do not mount the 360camera in a
corner. This reduces its effective cov-erage. Ensure the camera is mounted in intersections or heavy traffi c areas in open spaces.
2. Because its a 5MP sensor, do not expect that a dewarped section will be that same resolution. A single dewarped view can be, depending on what native resolution of the camera, VGA or less, based on how much the user digitally zooms.
The Application: Wall Mount with 180
This is taking the fi sheye and wall mount-ing it for a desired 180 viewing angle (east to west). As opposed to stitching multiple sensors, for this application, the fi sheye is displayed in one full panoramic view in your VMS of choice. Users can then digitally zoom into this view for a more detailed perspective. Because of the use of a fi sheye and to minimize distor-tion, the best portions of the image are sectioned off for display, and eliminate the unimportant sections such as the sky, for example. The panoramic view is in-tended to be an overview shot and will provide users a camera reduction solu-tion with a single installation point. Ap-plications include sides of buildings and parking lots, retail checkout counters, stairwells, hallways (T intersections) and bus/train platforms.
The Truth about FisheyeDewarping and how to use itBy Thomas Carnevale
Thomas Carnevale is the president of Sentry 360.
1214sec_010_011_IndVert_v4.indd 10 11/13/14 11:31 AM
-
W W W . S E C U R I T Y - T O D A Y. C O M 1 1
The DOs:1. Ensure the 180 is mounted in the
middle of the environment, cen-tralizing its perspective view to evenly distribute the image quality throughout the panoramic image.
2. Make a clear decision on what mounting height as this effects the overall pixel density of the image.
3. For higher mounting, ensure that the 180 has the ability to point downward, either with the outdoor housing or mini-dome lens gimbal, as not to record unnecessary infor-mation such as clouds or the ceiling.
The DONTs:1. Do not mount the camera where large
obstructions can cause blind-spots.2. Do not use this as a replacement for
optically-zoomed PTZ for license plate capture. The 180 panoramic view is designed to be an overview scene.
The Application: Table, Counter, Floor and Vehicle 360 TechnologyThis is using the 360 with a completely different algorithm that weve named InVerted360, and could even call for applications users havent been think-ing about. When mounting the cam-era on a surface, table, counter or fl oor looking upward, the perspective chang-es. In a conference room, for example, you can navigate to the speaker or pre-senter and interact with others in the meeting room while being on a remote connection. In a retail or cash counting application by mounting or embedding the camera in the counter, users get a closer, more interactive perspective. It even has applications in gaming tables for blackjack or poker to have a table-level perspective of the full interaction between players and dealers.
To deliver the full functionality of 360 fi sheye technology, Sentry360 has developed a software development kit (SDK) customized for VMS develop-ers and NVR manufacturers. IP video surveillance has evolved into an eco-system that allows the users to choose best-in-breed technologies to create a full, customized solution for the end-user, based on their application. Over the years, we were forced to adapt our SDK to work within a variety of differ-ent software environments, languages and operating systems. To date, we feel that our SDK is the most integrated, fl exible and customizable, enabling the future of this technology to not be
limited. We boast that our SDK works with any operating system and software platform/language, and is ready to scale with any resolution as fi sheye lenses improve and Ultra-HD becomes more common place.
The Sentry360 SDK has given se-curity providers the tools necessary to
record and display the full 360 fi sheye image, and then in live or playback, correct the view for a full retrospec-tive PTZ in all directions. The point of 360 is to enable that PTZ experience with the ability of hindsight in full 360 degrees, all while providing full situ-ational awareness.
With nearly 30 technology integra-tions to date, Sentry360 has laid the ground work to optimize the future of this technology and has laid a path for future quality improvements for scaling in resolution and compression while opening the door to new appli-cations.
This solution is
available directly from
DM Network Video
Effective early FIRE DETECTION for high value assets
Theres more to Dedicated Micros...
ask about our IP network video solutionsCal l 1-877-367-8778 or v is i t
www.dm-networkvideo.com
Copyright AD Group 13th October 2014
FireVu Visual Smoke Detection (VSD) reliably detects smokeand ame at source and enables a fast, speci c response.
A solution that provides early detection of ame and smoke anywhere within the visual eld both inside and out.
Live and recorded video helps to direct re protection professionals when danger arises and enables forensic analysis.
Absolute temperature sensing, VSD and ame detection combined in new multi-detector. Detect and differentiate between combustible and normally high temperature and visually verify.
Monitoring and visual veri cation of a re that can be conducted equally effectively on-site or remotely.
Fully tailored masking and zoned detection screens out unwanted areas of view and enables double knock detection.
A re detection solution managed from a single GUI alongside NetVu Connected security video.
FireVu has successfully been used to protect demanding industries including: high value property, petrochemicals facilities,manufacturing and food processing plants, air hangars, tunnels, recycling and waste management sites.
Go to sp.hotims.com and enter 13 for product information.
1214sec_010_011_IndVert_v4.indd 11 11/13/14 11:31 AM
-
1214 TOP PICKS Compiled by Security Products Staff
1 2 1 2 1 4 | S E C U R I T Y P R O D U C T S
Zebra TechnologiesFast, yet reliable performance
The Zebra ZXP Series 7 produces vivid cards with precise color control.
The printer is ideal for these verticals: health-care, higher education, hospitality and retail.
The printer features the low cost of ownership coupled with operational effi ciency.
Superb photo-like image quality comes with every printed card.
Security features include lamination options. The ZXP Series 7 card is perfect for employee
ID and access control applications.Zebra Technologies.Go to sp.hotims.com and enter number
354 for product information.
Ultra Magicard100 card capacity input hopper
The Rio Pro single-sided card printer is a di-rect-to-card printer ideal for mid to high vol-ume card printing applications.
The unit has the following Print speeds: 23 sec-onds for color and 6 seconds for monochrome.
Built-in visual security is included with stan-dard or custom HoloKote to print a watermark at no extra cost.
Standard USB & Ethernet connectivity are available.
The printer is fi eld upgradable to duplex print-ing with a simple drop-in ribbon.
Optional upgrades include: magnetic and smart card encoding, extended warranty and loaner coverage plans.
A 3-year warranty on printer and printhead is also availableUltra Magicard.Go to sp.hotims.com and enter number
355 for product information.
Team NiSCAHigh speed, low cost
The NiSCA PR5350 offers a small foot-print, 24-bit color, 256-grayscale, security lamina-tion, encoding options and prints at the as-tounding speed of over 164 cards/hour and 16MB of memory.
The PR5350 is available with options for Mag-Stripe, IC Chip, RFID reading and encoding similar to the PR5310s options; and also secu-rity lamination with the addition of the PR5302 laminator.
Variable UV printing is available for creating an additional security layer.Team NiSCA.Go to sp.hotims.com and enter number
356 for product information.
EvolisCapitalizing on retransfer
card printing
AVANSIA, the latest in card printers from Evolis, capitalizes on retransfer card printing, a technol-ogy that is proven to deliver top-notch quality.
With retransfer, card printing is performed in two steps: fi rst, the card layout is printed on a transparent fi lm; then the print layer is trans-ferred from the fi lm to the card.
This technology makes it possible to cover the entire surface of the card.
Avansias 600dpi print head delivers vivid quality images, as well as sharp texts, micro-prints and water marks.Evolis.Go to sp.hotims.com and enter number
357 for product information.
HID GlobalSuperior print quality and encoding
HID Globals FARGO HDP5000 high defi nition printer/encoder provides superior print quality, high reliability, durability and greater security when producing ID badges and creating/encod-ing secure identities across.
The solutions built-in iCLASS SE Encoder al-lows one-step, inline encoding of secure iden-tity data onto the industrys most common credential technologies, including HID Prox, standard iCLASS, iCLASS SE, Seos, MIFARE, MIFARE DESFire EV1 and future technologies.
The printer/encoder solution can also use high durable fi lm ribbons to provide longer card life and three times the durability, without needing an added laminator.HID Global.Go to sp.hotims.com and enter number
350 for product information.
Zebra TechnologiesDurable and abrasion-resistant
cards
The Zebra ZXP Series 8 is a retransfer card printer, providing industry-best throughput while achieving superior, photo-like image quality.
It is ideal for high-security ID applications that require durability and abrasion-resistance.
The Series 8 is able to print on uneven sur-faces, such as smartcards.
This print can be used for government-issued driver licenses and for high security ID cards.
Fraud protection is easy, since the fi lm is in-herently tamper-evident.
True edge-to-edge printing is offered, via over-the-edge printing.
The cards can be used as instant issuance bank cards.Zebra Technologies.Go to sp.hotims.com and enter number
351 for product information.
iDP Corp.High capacity card printing
capabilities
iDP Corp is announcing the much anticipated launch of the IDP SMART-70 Series that comes in December 2014.
The SMART-70 offers high capacity card print-ing capabilities with a unique modular construc-tion for easy upgrades, service and shipping.
With a 500 card input hopper, ink ribbon ca-pacity and optional exit hopper, the system is suited to users who have high-capacity needs, or for end-users who would like to secure their credential media in the securely locked printer.
Optional lamination and high-speed printing complete the package.iDP Corp.Go to sp.hotims.com and enter number
352 for product information.
DatacardStandard USB and
Ethernet connectivity
The SD260 is a single-sided direct-to-card ID card printer ideal for low- to mid-volume card printing applications.
TrueMatch printing technology creates vibrant colors and crisp card printing results.
Fast print speeds: the datacard creates 200 color cards and up to 850 monochrome cards per hour.
A manual feed option to print ID badges on the spot is available.
The anti-jam card handling system creates a smooth printing process.
Optional upgrades include: encoding, 100-card output hopper and extended warranty plans.
A 30-month printer and printhead warranty is available.Datacard.Go to sp.hotims.com and enter number
353 for product information.
1214sec_012_Toppicks_v2.indd 12 11/13/14 9:59 AM
-
Good things DO come in small packages, like full HD 1080p 2.1MP cameras. Speco has launched a new line of mini-bullet and mini-dome IP cameras that are perfect for covert or aesthetic-sensitive applications. Separate camera and encoder units allow for flexibility and easy placement up to 15 apart. With built-in standard PoE, WDR operation, 2-way audio communication, and micro SD card slots - these cameras
are perfect indoors or outdoors. Dont let their size fool you, these cameras deliver full HD 1080p resolution, are ONVIF compatible, and available in dark grey or white housings.
Good things DO come in small packages, like full HD 1080p 2.1MP cameras. Speco has launched a new line of mini-bullet and mini-dome IP cameras that are perfect for covert or aesthetic-sensitive applications.SSeparate camera andd encodder uniits lalllow ffor flfle ixibibilility a dnd easy placement up to 15 apart. With built-in standard PoE, WDR operation,2-2-wawayy auaudidioo cocommmmununicicatatioionn, a andnd m micicroro S SDD cacardrd s slolotsts - - t thehesese c camamererasas
are perfect indoors or outdoors. Dont let their size fool you, these cameras deliver full HD 1080pp resolution,, are ONVIF compap tible,, and available in dark ggrey y or white housinggs.
-
1 4 1 2 1 4 | S E C U R I T Y P R O D U C T S
INDUSTRY TRENDS
NOSTALGIA HAS NO PLACE IN VIDEO SURVEILLANCEWhy IP video will eventually supplant analog technologyBy Fredrik Nilsson
When network cameras fi rst appeared on the market in 1996 who could have imagined this fl edgling technology ever gaining a toehold in an industry dominated by analog cam-eras? Fast forward to today and one marvels at how much IP video has transformed the surveillance landscape.
In fact, market projections show that 2014 will be the year when IP video clear-ly surpasses the dollars spent on analog surveillance technology. What makes this all the more signifi cant is that IP video is only reaching 30 percent of todays chan-nels, which means there is enormous opportunity for further market growth.
WHY IP IS GAINING IN POPULARITYThere are a number of factors propelling the industry to supplant long-entrenched analog with more advanced IP video systems. Foremost is image usability. Reso-lution has progressed from a mere CIF resolution (352x240 pixels) to stunning multi-megapixels and full HDTV clarity. Superior H.264 compression standards and greater in-camera processing power have changed streaming from a few jerky frames per second to a smooth 30 frames per second, and in some instances even up to 60 frames per second.
The constrictive 4:3 aspect ratio refl ective of old CRT computer screens has been replaced by an expansive 16:9 ratio to complement the widespread adoption of widescreen HDTV monitors, a carryover from the home entertainment market.
Open standards afford another advantage. With so many business applications operating on the network, users have come to expect open platform architecture from all their IT products. IP video delivers.
Instead of being locked into proprietary DVR-based analog solutions, IP-based video surveillance systems allow users to pick and choose the best components for their environment. They can integrate storage, fi ber network and switch, operating systems, processors, network cameras and video analytics from multiple vendors with cost-saving off-the-shelf components. Because each component adheres to open standards, systems integrators can interconnect all the elements into a single cohesive system and replace or update components at will. This allows users to acquire ever-increasing functionality and performance throughout the life of their surveillance system and extend the return on their original investment.
Remote accessibility also has contributed to IP videos growing acceptance. As a network-based system, video cameras and storage can be accessed over the web. Unchaining security from their desktops and enabling them to view cameras live
1214sec_014_020_Nilsson_v2.indd 14 11/13/14 10:00 AM
-
Superior identicationLower costs
Get 4K ultra HD images with lower bandwidth and storage requirements. DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging lighting pervade the scene. And, intelligent Dynamic Noise Reduction minimizes bit rates to lower bandwidth and storage requirements up to 50%, reducing system costs and network strain. This makes 4K ultra HD imaging relevant for many surveillance applications, enabling you to see every detail, everywhere.Learn more at www.boschsecurity.us
Go to http://sp.hotims.com and enter 5 for product information.
Untitled-5 1 5/14/14 1:01 PM
-
1 6 1 2 1 4 | S E C U R I T Y P R O D U C T S
INDUSTRY TRENDS
from remote devices like smartphones and tablets de-livers unprecedented situational awareness wherever the user may be. It also means that integrators and service providers can troubleshoot, service and up-grade systems remotely, saving the expense and delay of an on-site service call.
CEMENTING IP VIDEOS PLACE AS A FRONTRUNNER As with all technological innovations, IP video con-tinues to evolve. With that evolution, high-end fea-tures are swiftly permeating the market at ever more affordable price points. Take, for example, Lightfi nder technology that delivers full color even at night under poor lighting conditions. The advanced image pro-cessing and in-camera software required to produce life-like color in HDTV resolution without artifi cial illumination cost $999 when it fi rst debuted in 2011. In 2014, the price has dropped to $699.
The same economies apply to the wide dynamic range with dynamic capture feature that solves the problem of delivering a usable image in a scene com-prised of both deep shadows and bright light. When the technology debuted in 2012, it sold for $999. To-day, cameras featuring both Lightfi nder and the latest wide dynamic range innovationWDRForensic Capture start at $1,099.
Built-in optimized infrared LED is another exam-ple. Built into the camera itself, these LEDs are power effi cient and automatically direct IR light exactly where the camera is pointed so that the illumination angle automatically synchronizes with the remote zoom. They produce less heat than their predecessors and therefore generate far less image noise. Unlike old IRs that burn out in a few short years, these new IR LED lights last at least seven years, even if used 24/7. Cameras with built-in IR LEDs fi rst came on the market in 2012 for an already attractive cost of $499.
Given all of IP videos advanced capabilities, it is no wonder that nostalgia for grainy, proprietary ana-log surveillance systems is sharply waning.
ACCELERATING GROWTH AT BOTH ENDS OF THE MARKETIP video is a far more scalable technology than DVR-based systems, which makes it ideal for enterprise sur-veillancelarge corporations with multiple satellite offi ces or citywide surveillance systems. In fact, most enterprise installations with more than 100 cameras are IP systems. While quite a few systems in the world have more than 10,000 cameras integrated into a single surveillance network, there are even a few with more than 100,000 cameras. This level of scalability can only be possible with network-based technology.
Despite the promise of IP video, there is still a high percentage of mid-size installations with between 10 and 100 cameras tied to analog technology. Their de-cision to cling to this older technology has been infl u-enced by integrators comfortable with the simplicity of installing and operating DVR systems. But with in-novations making network systems even easier to in-
stall and use, security integrators are starting to shift their infl uence to IP.
Analog also continues to dominate small system markets with fewer than 10 cameras due to the mis-conception that the old technology is the most cost-effective, least complex solution. But that perception is changing due to two important catalysts: cloud computing and low-cost, high-capacity on-board storage. In addition to making IP more affordable for low camera-count users, these innovations deliver the same technological advantages found in enterprise level systems, namely HDTV image quality and full scalability in single and multiple camera increments.
HOW DO THEY WORK?Cloud security. Also known as hosted video or video as a service limits a users surveillance system investment to network cameras and a secure Internet connection. The user pays a service provider a monthly fee to store the recorded data in the cloud and maintain system components remotely, eliminating the need for onsite storage hardware as well as in-house technical exper-tise to manage, troubleshoot, upgrade and service the system. This shifts the bulk of the surveillance budget from a hefty upfront capital investment to a more af-fordable monthly operating expense. A hosted video operating model can also easily tie into a monitoring service, enabling an alarm operator to visually verify an event before calling responders to the scene.
SD memory cards. They equip IP cameras with highly-effi cient, programmable internal storage. A ro-bust technology that can be accessed remotely over a network, an SD card eliminates the cost of an onsite server, DVR, NVR or PC to house the recorded video. Basic SD cards range in capacity from 64MB to 4GB. SDHC cards offer more storagefrom 8GB to 32GB. SDXC cards start at 64GB and can go as high as 2TB of storage. Instead of consuming bandwidth stream-ing video to an external storage device, the on-board storage can be accessed remotely over the network. When used in conjunction with hosted video, users gain the best of both worlds: having a monitored ser-vice and minimizing bandwidth consumption by stor-ing most video on the camera itself.
MAKING SMARTER USE OF VIDEO SURVEILLANCEIn the early days of surveillance, cameras were pri-marily installed as a deterrent to crime. In the last decade, surveillance has advanced to a forensic stage whereby video was tagged and viewed to identify de-tails of an incident after it occurred. Most recently, were seeing a shift from that reactive use of video to a more proactive use through real-time analysis.
Foremost is using intelligent analytics to bring the most relevant video to the foreground so that the operator can direct attention to a certain area as an incident unfolds or shortly thereafter. Some of those analytics include: Cross-line detection: sending an alert when a per-
son, vehicle or object crosses a perimeter
Go to sp.hotims.com and enter 15 for product information.
1214sec_014_020_Nilsson_v2.indd 16 11/13/14 10:00 AM
-
keeping focused
Honeywell is committed to keeping you focusedno matter what size the installation
On every job you do, youre focused on getting the best image possible with the
most affordable camera available. Check out Honeywells open, expanded line of
equIP Series camerasweve added 14 new cameras to the family! Our equIP
cameras provide crisp, high quality resolution so users can see objects in greater
detail. Users can now zoom in from greater distances, which means they can use fewer cameras to cover a
larger area than lower resolution cameras. The equIP Series now includes new models including 3 and 5 MP
camerasso theres a complete range of IP camera solutions for every application. From the simplest to the
most complex, whatever functionality your installation calls for, you can rest assured that Honeywell has an
IP camera that focuses perfectly on the task at hand!
To see more clearly, call 800.323.4576 or visit www.honeywellvideo.com to learn more. 2014 Honeywell International Inc. All rights reserved.
Go to http://sp.hotims.com and enter 33 for product information.
Untitled-2 1 11/7/14 10:46 AM
-
INDUSTRY TRENDS
1 8 1 2 1 4 | S E C U R I T Y P R O D U C T S
Motion detection: sending an alert or initiating a video recording when there is movement in the fi eld of view
People and vehicle counting: tracking the volume of foot and vehicular traffi c to manage location ca-pacity
License plate recognition: converting license plate images to OCR data for easy retrieval
Line management: triggering an alert when the number of people in line exceeds a specifi c numberNow that intelligent video has proven itself in se-
curity, its use extending into other areas of the busi-ness as well. Some of the typical retail and industrial applications for video analytics include: Dwell time analysis at merchandising displays Demographic analysis of shoppers by product cat-
egory Stock replenishment review Video verifi cation of cash register transactions and
vendor deliveriesBecause IP video is network-based technology, it
can be seamlessly integrated with other physical se-curity information management systems (PSIM) for more complete protection of people and property. Adding video verifi cation into the mix affords a num-ber of advantages:
When THE POWER IS IN THE KEY you have the ability to . . .
Control access to every lock
Eliminate re-keying costs
Reduce unauthorized entry
Monitor and report all access activity
Learn more at www.cyberlock.com/lock4 541-738-5500 [email protected]
CyberLock
Go to sp.hotims.com and enter 7 for product information.
Audio MonitoringBy Richard Brent
With the increasing number of security breaches, whether a cyber-attack or a campus break-in, end users are looking for integrated solutions that will provide new security services. One of the technologies that integrators and end users have directed their attention to is audio.
Audio is a valuable feature that complements traditional visual security systems by providing ad-ditional evidence and verifi cation. It plays a vital role in substantiating claims and incident reports. For example, when a police offi cer receives a dispatch from the local convenience store, he can listen to the
audio recording to confi rm whether its a false alarm or a precarious situation that requires backup. More integrators and end users are capturing the value of audio by installing this technology in their applications. Audio
will become more widespread, as the demand for delivering integrated security solutions to the end user increases. The perspective of the legality of deploying audio will also transition from grave objection to properly managing expectations of privacy.
The security industry will adopt more audio monitoring in the future; however, here are the top trends in audio monitor-ing from 2014:
1. Greater IP integration: More audio devices are being connected to a network or integrated into an IP camera sys-tem, allowing the end user to listen and speak to people from a remote location.
2. Distinguished feature in security systems: Integrators are offering audio monitoring as a way to provide a more turnkey security solution for the end user and to differentiate their services from competitors.
3. Increased use in the transportation industry: Several entities in the transportation sector, such as the New York Metropolitan Transportation Authority as well as school districts on the East Coast, are moving to install audio monitoring on trains and school buses to increase safety, reduce bullying and provide additional verifi cation in the event of an accident.
Richard Brent is the CEO of Louroe Electronics.
1214sec_014_020_Nilsson_v2.indd 18 11/13/14 10:24 AM
-
Maximum legal transmit power - 1 Watt
RF data rates up to 866 Mbps
Up to 540 Mbps Ethernet data rate
Line of Sight Range up to 30 miles
3-Port POE out 802.11at option
TRY OUR NEW HIGH SPEED800 MBPS ETHERNET SOLUTIONS
SECURE WIRELESS SOLUTIONS FOR INDUSTRIAL APPLICATIONS
NEED HELP WITH AN OUTDOOR WIRELESS CONFIGURATION?
Try our new wireless solution selector tool at www.avalanwireless.com
(866) 533-6216www.avalanwireless.com
Leaders in Wireless IP Video Connectivity
Go to http://sp.hotims.com and enter 27 for product information
Untitled-8 1 11/10/14 4:52 PM
-
INDUSTRY TRENDS
2 0 1 2 1 4 | S E C U R I T Y P R O D U C T S
Video verifi cation on alarms: save on penalties for false alarms
Access control systems: confi rm the identity of badge users
Intercom systems: screen visitors be-fore unlocking door
DELIVERING EVEN BETTER DETAILSThe next big game changer for IP video is Ultra HD, also known as 4K, which will bring even higher image quality to the table. Nearly four times the resolu-tion of HDTV 1080p, 4K adheres to
the following standards: Resolution: at least 3840x2160 or
8.3 megapixels Frame rate: up to 120 fps Aspect ratio: 16:9 Color fi delity: a much larger color
palette than HDTVFor the surveillance industry this
translates into an unprecedented level of detail, making it easier for security professionals to identify people, objects and incidents from greater distances.
But with four times the resolution of HDTV comes at least four times the bandwidth consumption when stream-ing the video, and, of course, at least four times the volume of video data be-ing stored. Therefore the only way 4K to have any practical application, compres-sion technology will have to keep pace.
To use 4K at full resolution and frame rate, H.264 advanced compres-sion technology requires a bandwidth of roughly 20-30 MBps. Compressing the video stream below 10 MBps sac-rifi ces frames per second, video quality or both.
There is a new compression stan-dard on the horizon, however. H.265, also known as High Effi ciency Video Coding is the intended successor to H.264. A more effi cient compression algorithm, its designed to improve vid-eo quality and double the compression ratio of its predecessor. The standard was formally published in June 2013 and the consumer electronics industry anticipates products equipped with H.265 to reach the market by the end of 2014. But the transition to the video surveillance world is still several years out since the standard has to be incor-porated not only in video cameras, but also in all the associated components like graphics cards, video displays and video management systems.
IP VIDEO CONTINUES TO HAVE FAR-REACHING POTENTIALIP video has come a long way from its rudimentary debut in 1996. As its lead-ing edge advantages over analog con-tinue to exceed expectationsat the enterprise, mid-size and small system levelsthe potential customer base for IP video continues to expand exponen-tially. This presents an attractive op-portunity for security integrators and installers looking for solutions that will benefi t all aspects of their customers operations.
Fredrik Nilsson is the general manager for Axis Communications Inc. in North America.
OPTIMIZED CERTIFIED GUARANTEED
Thank you for another great year!
Free Seneca Guide to xVault surveillance solutions products, download at info.senecadata.com/security-products
Filled Product Gaps in the Market Low to Mid Level xVault NVR xVault Hybrid NVR for Analog/IP Pre-loaded xVault NVR with OnSSI 24/7 Live Support
Expanded Strategic Partership Anixter Milestone OnSSI Samsung
Brand Awareness ASIS ISC West Partner Connect PSA Security
Seneca Data Distributors. Inc. | 7401 Round Pond Road | N. Syracuse, NY 13212 | p: 877.814.0348 | www.xvaultsecurity.comIntel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
xVault systems feature the Intel Xeon processors.
A new Intel-based PC starts in a ash, has the power to do more and is less expensive than you think.
2014HIGHLIGHTS
Happy Holidays fromthe Seneca FamilY
Go to sp.hotims.com and enter 29 for product information.
1214sec_014_020_Nilsson_v2.indd 20 11/13/14 10:00 AM
-
4Like CO and Smoke in a single detector. The award-winning i4 Series Combination CO/Smoke Detector and i4 Interface Module work together to provide the rst system-connected combination solution for conventional re and security systems.
The i4 Detector truly hits the spot for installers as well as homeowners. It uses the most reliable and accurate CO and Smoke sensing technologies to detect dangerous levels of smoke or CO. Ongoing maintenance is easy, thanks to its eld-replaceable CO cell. And the i4 Combination Detectors 2- or 4-wiredesign makes installation quick and easy, just like making a PB&J should be.
The i4 system works with most conventional security panels, and the i4 Module even interconnects sounders on the loop. Plus, youll have the freedom to mix and match up to 12 i4 Combination Detectors and compatible i3 Smoke Detectors per i4 Module. Sink your teeth into a life safety solution that means less wire, less labor, and fewer devices on the wall or ceiling. To learn more visit:
i4 Interface Module(Required)
i4 CO/Smoke Detector
Some things arejust great together.
go.systemsensor.com/i4pbj-sp
2014 System Sensor. All Rights Reserved.
Go to http://sp.hotims.com and enter 11 for product information.
Untitled-2 1 7/9/14 10:24 AM
-
2 2 1 2 1 4 | S E C U R I T Y P R O D U C T S
GROWTH AND TRENDS
6 TRENDS IMPACTING ACCESS CONTROL AND THE OVERALL SECURITY MARKETIncreased emphasis placed on interoperability and total cost of ownership in security purchasing decisionsBy Jeremy Krinitt
From 4K Ultra HD resolution surveillance cameras to near fi eld com-munication (NFC) or Bluetooth-enabled access control readers and applications, technology innovation in the security industry runs the gamut. However, while these newer technologies and the advanced functionality they offer generate a lot of buzz, the fact remains that
todays end users and systems integrators are looking for much more in the securi-ty devices they purchase than just the latest and greatest features. Despite a slowly recovering economy, security budgets have yet to climb back to their pre-recession levels. As a result, end users and integrators must be able to show a tangible return on investment (ROI) on the security solutions they purchase.
For many years, security operated within a silo, but that is quickly changing. Companies are now looking for security solutions that can be leveraged across different departmentshuman resources, facilities and moreand also provide long-term value to the organization. Additionally, it is no longer acceptable for security manufacturers to use a checkbox approach to the features they offer. More thought needs to be put into how the features of a product can be best uti-lized by customers. For example, a video surveillance company could develop a revolutionary type of analytic, but if the setup of that analytic is temperamental for integrators, then what difference does it make to customers looking to use that technology?
Much of the industrys recent focus on innovation is around additional prod-ucts that can be added into the security environment, not on the fundamental value provided to integrators and end users. The question for the industry is this: What market factors and technology innovations are going to be the key to driving real growth moving forward?
Here are few things that could play a big role in the industry in the not-too-distant future.
OPENNESS AND INTEROPERABILITY The word open is thrown around frequently in the security industry, but it is typically used to describe a security system, such as access control, video surveil-lance or other solutions, that are interoperable with products from other vendors. Whole spectrums of possibilities exist when someone uses the term open. Where the technology sits on this spectrum can have a signifi cant impact on the experi-ence of the integrator and end user, both in the initial implementation of the solu-
tion and in the technology options in the future. In the best scenario, the connections between solutions use a published stan-
dard. This often provides the manufacturers the best visibility into the connection between solutions, and ultimately provides greater fl exibility to the end user. One way this can be achieved in the access control realm is by implementing solutions that comply with the Open Supervised Device Protocol (OSDP), a communica-tions specifi cation developed by the Security Industry Association (SIA) to enable devices, such as card readers and control panels, to work together.
Using a control panel that also supports OSDP, for example, can provide users with the fl exibility they need for their future access control decisions. Customers should ensure the solutions they select support open standards, but it is also im-portant to consider what they are doing to ensure long-term value for the security solution. Just like our laptops and cellphones, technology in the security space is constantly in motion. Manufacturers should be designing solutions to support the latest standards, and to provide a runway for the technologies around the corner.
GREATER USABILITY AND RELIABILITYAlthough there is often a shift of trends within the industry where manufacturers will fi nd themselves pushed by customers to deliver a certain set of features, two things have remained constant through the years: usability and reliability.
There are numerous examples that can be found across all product sectors of systems that have either been disregarded, or in some cases, simply turned off because they triggered repeated false alarms or because an organizations security staff found them onerous to manage. Ultimately, vendors that want to deliver an effective solution for their customers must ensure that their product not only pro-vides the features that they need, but is also dependable and user-intuitive.
CHANGING VERTICAL MARKET DYNAMICS AND REGULATORY COMPLIANCEWhile nearly all vertical markets will have an impact, to some degree, on shaping the access control and overall security industry in the years to come, there are some whose impact will be felt sooner rather than later. For instance, the govern-ment and healthcare markets stand poised to have a substantial effect on product manufacturers due to the necessary requirements these markets have put together around access control.
The government sector is a prime example of how changing requirements
1214sec_022_026_Krinitt_v3.indd 22 11/13/14 11:32 AM
-
www.infinias.com | 800.691.8974Engineered by
Access Control, Meet Video
Access Control + Video on a Single Platform infinias 100% IP-based access control and video management systems bring all your doors and video to a single platform. Made possible by the all-in-one Intelli-M Access NVR, you can manage and configure both video and access control from one browser-based UI. infinias continues to bring together the features and capabilities that make access control and video management simple and convenient.
A C t l Vid Si l P
All-in-one access control plus video management server
Go to http://sp.hotims.com and enter 8 for product information.
Untitled-9 1 5/13/14 4:30 PM
-
2 4 1 2 1 4 | S E C U R I T Y P R O D U C T S
GROWTH AND TRENDS
within a specifi c market can have a broader impact on the security industry as a whole. Unlike other industries where minimum security requirements are largely established by the organization itself, security standards in government agencies are regulated by different federal guidelines and mandates that change and evolve with the threat landscape.
In effort to establish a common identifi cation standard for government em-ployees and contractors, Homeland Security Presidential Directive-12, more com-monly known as HSPD-12, was issued shortly after the 9/11 terror attack by the Bush administration. HSPD-12 subsequently resulted in the creation of Federal Information Processing Standard-201 (FIPS-201), requiring federal employees and contractors to have personal identifi cation verifi cation (PIV) credentials. Ad-ditionally, some corporate entities have also opted to adopt standards similar to PIV due to the enhanced level of security it outlines, which points to how the gov-ernment market has impacted the access control industry.
However, because many agencies found that the different components they pur-chased to become compliant with the PIV standard didnt work well together, the government recently introduced a new program called Federal Identity, Credential and Access Management (FICAM), which outlines the implementation of an end-to-end access control solution where all devices are interoperable with one another.
In the healthcare market, there has been a push over the last two decades to improve patient privacy with the implementation of the Health Insurance Por-tability and Accountability Act (HIPAA) and the Health Information Technol-ogy for Economic and Clinical Health (HITECH) Act. While these regulations are primarily designed to safeguard patient data in the age of digital information and cybercrime, the majority of data breaches are not the work of sophisticated hacking networks, but rather negligence on the part of healthcare employees. This means that physical access control measures within hospitals and other healthcare facilities has become critically important as it only takes one door being propped open to reveal a treasure trove of information to identity thieves.
As a result of the continually shifting threat landscape in these markets, se-curity manufacturers and the products they develop must continue to evolve to meet changing requirements. Oftentimes, it takes collaboration between all parties involvedmanufacturers, integrators and end users to develop comprehensive and effective solutions that not only meet the requirements set forth, but can main-tain and manage the system as technology advances.
INCREASED CONVERGENCE BETWEEN PHYSICAL AND LOGICAL ACCESS The advent of IP technology has dramatically changed the way security systems are installed, managed and monitored. It has also brought the worlds of IT and security together in ways that some people could have never dreamed. One of these ways is combining technologies to enable access to the physical locations of an organization as well as their computer networks.
Thats not to say there havent been some challenges in getting the technolo-gies lined up to provide an effective solution for end users; its been a tough sell in many ways. However, the value is certainly there as it simply makes sense for many organizations to have the capability of implementing a converged physical and logical access solution. Like other integrations, the value of the information that is present in a traditional access control system has applicability to the larger organization, and IT is one of those departments.
Despite the benefi ts that can be realized by bringing these two areas together, many companies have yet to understand how to take full advantage of this con-vergence. Meanwhile, solutions do not always deliver as advertised; therefore, untapped potential still exists. This will likely change, though, as organizations become more tech savvy and hold vendors accountable for what they need to be successful.
MOBILITY COMES OF AGE The development of NFC technology has been touted by many vendors in the in-dustry as the next great technological leap in access control. On the surface, this excitement is certainly understandable, given the proliferation of smartphones and other mobile devices as well as the increased desire by customers who want the same
garrett.com Tel: 1.972.494.6151
Team with GARRETT to create your SAFE ZONE
Sports fans are passionate about their teams. Garrett Metal Detectors help keep them safe so they can simply relax and enjoy their big game.
Our American-made products have been an integral part of the security plan at major sports events such as professional football, the Olympic Games, FIFA World Cup venues, the Pan American Games, and even the Little League Baseball World Series. Contact us to fi nd out more about our trusted hand-held scanners and advanced technology walk-through detectors.
Proudly Made In The USA
LLaw Enforcemeent Military Sppecial Events Evidence Recovery Loss Preveention Mass Traansit Government Facilities
Go to sp.hotims.com and enter 18 for product information.
1214sec_022_026_Krinitt_v3.indd 24 11/13/14 11:32 AM
-
Go to http://sp.hotims.com and enter 22 for product information.
Untitled-2 1 9/10/14 2:41 PM
-
GROWTH AND TRENDS
2 6 1 2 1 4 | S E C U R I T Y P R O D U C T S
level of convenience and usability as commercial security solutions in home consumer devices. However, despite the high hopes for NFC access control, ac-tual implementations have been slow to materialize for several reasons.
First, manufacturers have to be able to access the Secure Element (SE) of a mobile handset in order to embed a credential. To do so, companies have to enter into partnerships with wire-less carriers. Secondly, a large portion
of the smartphone market is domi-nated by the Apple iPhone, which until recently did not come equipped with NFC technology. Although theiPhone 6 and iPhone 6 Plus, which made its debut in stores last month, features an
NFC antenna, it still remains to be seen if the company will grant security man-ufacturers access to an API for access control purposes. With that being said, there is now one less potential hurdle to wider adoption of NFC in the market.
The announcement by Apple ad-dresses one of the barriers the access control industry has faced with regards to NFC, i.e., loading an identifi er onto the secure element, IHS analyst Blake Kozak wrote in a research note pub-lished by the market research fi rm last month. With the API mentioned by Apple, it is possible that access control manufacturersamong others in the supply chaincould load and com-mand an identifi er directly onto the secure element.
In the meantime, developers have turned their attention to Bluetooth Low Energy (BLE) technology which has several advantages over NFC, in-cluding the fact that it is available on almost every mobile phone available to-day and because the SE doesnt have to be accessed in order to have the secure credential placed onto it.
Regardless of which technology wins out, the trend toward increased convenience and mobile access is one that will continue in the market for years to come.
ADVANCED CAPABILITIES MOVE TO THE EDGEWhile edge capabilities are not new to the industry, there are signs pointing to increased interest by end users in us-ing these capabilities more so than they have in the past. As such, manufactur-ers need to be able to deliver platforms that have the power and fl exibility nec-essary to provide advanced capabilities at the edge.
When it comes to access control, there are many functions that can be performed at the edge that can enhance value for the end user. For example, be-ing able to display messages to users when they swipe their card at a door, and the addition of personalization and communication options are func-tionalities that vendors will look to improve upon as time goes by.
Jeremy Krinitt is the general manager of Frontier Security, a divi-sion of Matrix Systems.
REMOTEREPORTING & CONTROLMONITORING
Network Communication ModuleLINQ2
- Facilitates quick and accurate power supply diagnosticsvia LAN/WAN which reduces or eliminates costly service calls
- Email and/or SNMP trap message notifications forDC output voltage, output current, AC status,
battery status, unit temperature and more!
- Local or remote control of power output(s) and(2) integral network controlled form C relays
More than just power.
Made in the U.S.A. - altronix.com - Lifetime Warranty
Download the free Altronix App!
Monitors and controls two (2)eFlow series power supply/chargers
Go to sp.hotims.com and enter 10 for product information.
1214sec_022_026_Krinitt_v3.indd 26 11/13/14 11:32 AM
-
Supported Surveillance
Access PointsLink remote IP camera installations to a
network with rugged TRENDnet outdoor-rated access points.
PointManage network access to
surveillance systems with TRENDnet Web Smart and Layer 2 switches.
Smart SwitchesPoE Solutions
IP Cameras
Expand a surveillance system with reliable TRENDnet PoE and PoE+ switches, injectors, and splitters.
E S l ti
TRENDnet offers a complete networking hardware foundation which supports the efficient expansion of IP based surveillance systems. Look to TRENDnet for all of your IP camera networking hardware needs.
Outdoor
Scan me
888-326-6061 (Option 1)[email protected]
2014 TRENDnet. TRENDnet and its logos are the registered trademarks of TRENDnet Inc. All rights reserved.
PoE Wireless
Go to http://sp.hotims.com and enter 23 for product information.
Untitled-3 1 8/19/14 12:04 PM
-
ME TOO PRODUCTSBeing wise about the products you present to end usersBy Ian Johnston
For manufacturers to play within the commodity space, they need to provide the most features, ease-of-use and the best reliability, camera versus camera. If that is accomplished at the going price, you have everything you need to compete in that arena.
Leadership comes from recognizing the specifi c needs of an end user and innovating better ways to meet those needs affordably. An example of po-tential industry leadership is the practical application of what have become known as edge surveillance products.
UNDERSTANDING EDGEI think that my defi nition and concept of edge is very differentthan anyone else. I loathe the phrase edge now; its been perverted and abused into being something that is so constrained and limiting that its become useless as a defi nition of what I thinkedge can be.
The current structure of how IP video is generated, managed and consumed is backwards and behind the curve when viewed in context to other analog, digital transitions. All the security industry has created thus far is a faster, more expensive VCR and a higher resolution CCTV camera. The paradigm of how everything works and knits together still intrinsically follows that same tired, wholly-broken 1970s model. In order to progress and step into the 21st century, this must stop.
A camera is simply a sensor that collects video, but a modern IP camera has a full 32-bit server with more memory and computing power than the personal com-puter I had when I was studying at a university. Imagine if we said that a mobile phone could only be used for phone calls simply because it was called a phone?
The same concept and restriction is being pushed onto cameras.Edge, for me, means autonomy. Personally, I prefer the term hive rather than
edge since it has a better connotation of a system of individual elements that are all working autonomously, yet collectively, to get a job done. Please note that my vision is impossible if Im constrained to just a camera; the right VMS is a canvas on which to paint. My concept may still be a bit too far ahead of the curve in terms of what the security industry can digest, so its best to lay out theedge in steps and as a roadmap of what will come:
Storage. If a camera needs storage for the video it is collecting, there are many assets it can use. The one that has been pushed by most vendors today is using lo-cal or edge storage in the form of an SD card, or in our case, multiple SD cards. Thats great, especially given the fact that we at ISD/Digital Watchdog (ISD/DW) can put up to a full Terabyte of storage on a camera and thats only one possible destination. Other popular destinations would be a conventional PC server, nosql ORACLE database, NAS box or Amazon EC3 cloud storage. Fundamentally, it doesnt matter what or where it is; what does matter is the size of the data that youre trying to move around and making smart choices about bandwidth man-agement. Data shouldnt be constrained to a single repository or a single function, and all devices need to work together to ensure that everything is taken care of and that no single entity fails or is a point of failure.
One of the jobs of a camera is to make sure that the video it is generating gets stored. It should be empowered to use any asset that it has access to in order to fulfi ll that role. An edge camera sending video to a standard PC is perfectly legiti-mate, but if that connection fails, it has an obligation to switch to its local reposi-
GROWTH AND TRENDS
2 8 1 2 1 4 | S E C U R I T Y P R O D U C T S
1214sec_028_031_Johnston_v3.indd 28 11/13/14 10:01 AM
-
Go to http://sp.hotims.com and enter 16 for product information.
Untitled-5 1 11/6/14 5:08 PM
-
GROWTH AND TRENDS
3 0
tory. If that fi lls up or breaks, then it should switch to another camera and use its SD card instead. Arguably, if the device is in a critical area, it should be doing this all the time and sending the video to all destinations simultane-ously. It has the responsibility of check-ing in with its hive mates periodically to make sure they arent having problems and are still visible on the network.
The point is that cameras should no longer be devices that blindly spew out video in a fi re-and-forget mecha-nism. Instead, they should be given the responsibility to ensure that their pay-load is delivered reliably. Think more of an asynchronous, peer-to-peer ar-chitecture where cameras and servers have equal footing and a responsibility to cry if any of them are unhealthy.
None of that exists today, except in our lab.
Army-of-one model. All imple-mentations for the moment are in a relatively conservative manner, but that will blossom and fl ourish with better IPVMS platforms. The camera hosts some form of the server on itself and uses local storage to write video. Cur-rent systems have this as an army of one, meaning theres no interaction between the cameras, nor is there any interaction with a conventional server.
The army-of-one issue is where most consumers have a signifi cant amount of heartburn about deploying edge: What happens if the camera gets stolen? What happens if the SD card breaks? What happens if things stop? How do I know that it failed if the
camera fails silently? All are good questions and consum-
ers are smart to think about such things, except for the fact that if a camera is re-placed with a server and it breaks, now multiple cameras arent recording.
While its limited, this model is use-ful for applications where you dont have the ability to have a relatively high power server running in a remote instal-lation. Construction site monitoring or remote/covert surveillance are great ap-plications. The fact that ISD/DW cam-eras are low power (2 watts) makes it easy to deploy cameras using battery/solar power. These days, a 64GB card can provide almost a week of storage, if recorded on motion.
A properly designed edge system is more scalable, fault-tolerant and has the ability to adapt to other requirements. It doesnt have to be more expensive than
a conventional head only system since most of the concepts Im talking about are largely software based, using a differ-ent paradigm of how the security system gets deployed.
Applications. This is where edge cameras have an immediate advantage
over their acrophobic brethren. It is summed up with one word: scalability.
Analytics have traditionally been run on conventional PC servers and have had a tendency to over promise and under deliver. Smart folks have long fi gured out how to use some clever
math to determine what the camera is looking at. Theyre usually prototyp-ing with a single camera running on a big iron PC with tons of RAM. Those same people demo it to their sales team who immediately say, Wow! I can sell that! Then, they get venture capital
Go to sp.hotims.com and enter 26 for product information.
1214sec_028_031_Johnston_v3.indd 30 11/13/14 10:01 AM
-
3 1
funds to sell it to the world. Everyones happy; they do demos to potential cus-tomers and install test deployments. All is good. The challenge comes when their customer wants to use more than a few cameras on the same PC. Here is the awkward conversation about hav-
ing to buy more big iron servers; its just not scalable.
As a good friend of mine, who lead the engineering team of a leading ana-lytics company, said, You cant go out of business fast enough being an analytics company. Most have become
VMS companies with optional analyt-ics to keep alive the dream of what they started. The critical fl aw, with the pos-sible exception of a select few compa-nies: Analytics companies all wanted to run on generic cameras, hoping that the various camera companies would help
sell their solution. It never happens. Bad things happen.
CHANGE THE RULESThe consumer electronics industry has led to some stunning innovations and advancements in mobile computing. The fact that you can play Angry Birds on your phone is a prime example. As for the security industry, as a whole, theyre focusing on making the camera equivalent of a No. 2 pencil, so theyre unwilling to put any meaningful invest-ment of technology into the cameras. This means they cant do anything in-telligent at the edge and no one is able to escape the black hole that is com-moditization and consolidation.
With modern CPUs that are tar-geted for mobile devices, it is possible to run meaningful analytics at the edge. Right now, business analytics and intel-ligence for marketing applications are all the rage.
We announced at the 2014 ISC West show a partnership with Prism Skylabs, and at the ASIS 2014 show, deployment with their analytic fully running inside our next generation cameras without any compromises. Why is this impor-tant? Why do I feel this is critical to their success? Scalability and the elimi-nation of servers.
With the kind of deployments I have described, every camera has the pro-cessing power it needs to be successful. Whether deploying three or 3,000 cam-eras, it doesnt matter. Its scalable, de-terministic and eliminates the need for expensive servers. It is a win for every-one, even IT departments that tend to be suspicious of any third-party servers installed on their networks. They are correct to be nervous, given the threat of malware that inevitably gets upload-ed, not to mention inappropriate activ-ity that often coincides with a PC that has a screen, keyboard and network connection.
The camera is an appliance. It has everything it needs to automatically confi gure and deploy itself when at-tached to the network by integrators. That user experience can be simplifi ed to a lick-and-stick, analog-like deploy-ment. It is simplicity that just works.
Ian Johnston is the CTO at Digital Watchdog.
Go to sp.hotims.com and enter 26 for product information.
1214sec_028_031_Johnston_v3.indd 31 11/13/14 10:01 AM
-
3 2 1 2 1 4 | S E C U R I T Y P R O D U C T
1214 NEW PRODUCT OF THE YEAR WINNERSCompiled by Lindsay Page, Senior Editor
ACCESS CONTROL
Axis CommunicationsAXIS A1001 Network Door ControllerThe AXIS A1001 Network Door Controller is a non-proprietary, open IP-based access cont