sp_1412dgd

60
www.security-today.com Integrated New Product and Technology Solutions for Security Professionals December 2014 Vol. 18, No. 12 Mobile App Leveraging human expertise Viakoo quickly detects IP video failures, diagnoses problems and alerts users with vital information to repair any issues. Information refreshes every 20 min- utes. A new mobile app brings this information to users’ smartphone screens. By leveraging Viakoo’s proprietary technology and human expertise, users gain critical insight into their video networks behavior, capturing valuable perfor- mance metrics and eliminating missing video. One click connects subscribers to video infrastructure experts for insight and technical support. Viakoo. Go to sp.hotims.com and enter number 300 for product information. Video Insight v6 Software Designed for the education market The new Video Insight v6 software is now bundled with MonitorCast- EDU, an enterprise access control application designed for the educa- tion market. Video Insight recognizes the unique security, budgetary and infrastructure challenges faced by educational institutions. The v6 software leverages existing network infrastructure and Mercury-based access control system and provides necessary features to enhance campus security with no additional cost. Video Insight. Go to sp.hotims.com and enter number 301 for product information. MegaDome 2 Megapixel Cameras Additional features include several enhancements Arecont Vision has added significant enhancements to its all-in-one MegaDome 2 Day/Night megapixel cameras. New features include Arecont Vision’s STELLAR (Spatio TEmporal Low Light ARchitecture) low light technology, optional on-board storage up to 32GB via an SDHC card slot; CorridorView capability that allows the camera’s image to be rotated 90 degrees for better coverage in hallways and corridors; and an extended ability to scale images to different resolutions to better meet system bandwidth and storage requirements. Arecont Vision. Go to sp.hotims.com and enter number 302 for product information. CompleteView 4.4 With full Samsung analytics support Salient Systems’ CompleteView 4.4 supports camera analytics and alarm events for Samsung’s product line. The integration supports alarm inputs, tamper detection, video analytics for objects entering, exiting, passing and appearing/disappearing from a region of interest. Along with the above analytics support, CompleteView 4.4 also offers integration with Samsung facial detection and audio detection. Salient Systems. Go to sp.hotimes.com and enter number 303 for product information. Digital Deterrent No licensing fees Speco Technologies’ NSP NVR with built-in PoE is the only NVR of its kind that provides the ease of an IP setup with the simplicity of an analog system . Other NVRs scan for cameras, but they don’t auto register and enroll IP cameras to produce a picture automatically. Also, the NSP NVR is equipped with Digital Deterrent, EZ Networking, EZ search, 2-way audio through smart phone apps, DDNS, no licensing fees and more all in one package. Speco Technologies. Go to sp.hotims.com and enter number 304 for product information. Middleware for Asset Monitoring Intelli-Track also good for personnel tracking and theft prevention Transponder and Reader Engineered Systems Inc., together with OSSI, introduces tres Intelli-Track middleware for asset monitoring, person- nel tracking and theft prevention. Coupling the tres Intelli-Track mid- dleware with tres433 Active Tag RFID products allows users to track assets (including personnel) in real time while generating alerts/alarm events when assets enter unauthorized zones, unescorted individuals or assets enter secure areas, personnel or assets go missing from a monitored area, or even when assets simply go into motion. This product is also customizable and scalable. Transponder and Reader Engineered Systems Inc. Go to sp.hotims.com and enter number 305 for product information. FLIR Low-Cost Thermal High performance at an affordable price FLIR low-cost thermal cameras provide superior video security day and night. Available in bullet, mini-bullet, and PTZ dome configurations with reso- lutions up to 640 x 480, and fields of view as narrow as 9°. FLIR’s low-cost thermal cameras maintain high-quality standards at an economical price, and provide imagery that is unmatched for intrusion detection and alarm assessment. FLIR. Go to sp.hotims.com and enter number 306 for product information. We care. Staying with you all the way. www.axis.com/support Electronic security that secures more business. Schlage ® NDE wireless locks with ENGAGE™ technology open up a whole new business opportunity: more doors. With NDE wireless locks, you can offer your clients the benefits of electronic access control in interior spaces – leading to higher client satisfaction and, of course, higher market share. Learn how to secure more doors at allegionengage.com/sp or call us at (877) 556-1272. Go to sp.hotims.com and enter 34 for product information.

Upload: astralis007

Post on 17-Dec-2015

219 views

Category:

Documents


7 download

DESCRIPTION

SECURITY PRODUCTS 12/2014

TRANSCRIPT

  • www.security-today.com

    Integrated New Product and Technology Solutions for Security Professionals December 2014 Vol. 18, No. 12

    Mobile AppLeveraging human expertiseViakoo quickly detects IP video failures, diagnoses problems and alerts users with vital information to repair any issues. Information refreshes every 20 min-utes. A new mobile app brings this information to users smartphone screens. By leveraging Viakoos proprietary technology and human expertise, users gain critical insight into their video networks behavior, capturing valuable perfor-mance metrics and eliminating missing video. One click connects subscribers

    to video infrastructure experts for insight and technical support. Viakoo.Go to sp.hotims.com and enter number 300 for product information.

    Video Insight v6 SoftwareDesigned for the education marketThe new Video Insight v6 software is now bundled with MonitorCast-EDU, an enterprise access control application designed for the educa-tion market. Video Insight recognizes the unique security, budgetary and infrastructure challenges faced by educational institutions. The v6 software leverages existing network infrastructure and Mercury-based access control system and provides necessary features to enhance campus security with no additional cost. Video Insight.Go to sp.hotims.com and enter number 301 for product information.

    MegaDome 2 Megapixel Cameras Additional features include several enhancementsArecont Vision has added signifi cant enhancements to its all-in-one MegaDome

    2 Day/Night megapixel cameras. New features include Arecont Visions STELLAR (Spatio TEmporal Low Light ARchitecture) low light technology, optional on-board

    storage up to 32GB via an SDHC card slot; CorridorView capability that allows the cameras image to be rotated 90 degrees for better coverage in hallways and corridors; and an extended ability to scale images to different resolutions to better meet system bandwidth and storage requirements. Arecont Vision.Go to sp.hotims.com and enter number 302 for product information.

    CompleteView 4.4With full Samsung analytics supportSalient Systems CompleteView 4.4 supports camera analytics and alarm events for Samsungs product line.The integration supports alarm inputs, tamper detection, video analytics for objects entering, exiting, passing and appearing/disappearing from a region of interest. Along with the above analytics support, CompleteView 4.4 also offers integration with Samsung facial detection and audio detection. Salient Systems.Go to sp.hotimes.com and enter number 303 for product information.

    Digital DeterrentNo licensing feesSpeco Technologies NSP NVR with built-in PoE is the only NVR of its kind that provides the ease of an IP setup with the simplicity of an analog system . Other NVRs scan for cameras, but they dont auto register and enroll IP cameras to produce a picture automatically. Also, the NSP NVR is equipped with Digital Deterrent, EZ Networking, EZ search, 2-way audio through smart phone apps, DDNS, no licensing fees and more all in one package. Speco Technologies.Go to sp.hotims.com and enter number 304 for product information.

    Middleware for Asset MonitoringIntelli-Track also good for personnel tracking and theft prevention

    Transponder and Reader Engineered Systems Inc., together with OSSI, introduces tres Intelli-Track middleware for asset monitoring, person-nel tracking and theft prevention. Coupling the tres Intelli-Track mid-dleware with tres433 Active Tag RFID products allows users to track assets (including personnel) in real time while generating alerts/alarm events when assets enter unauthorized zones, unescorted individuals or assets enter secure areas, personnel or assets go missing from a

    monitored area, or even when assets simply go into motion. This product is also customizable and scalable. Transponder and Reader Engineered Systems Inc.Go to sp.hotims.com and enter number 305 for product information.

    FLIR Low-Cost ThermalHigh performance at an affordable priceFLIR low-cost thermal cameras provide superior video security day and night. Available in bullet, mini-bullet, and PTZ dome confi gurations with reso-lutions up to 640 x 480, and fi elds of view as narrow as 9. FLIRs low-cost thermal cameras maintain high-quality standards at an economical price, and provide imagery that is unmatched for intrusion detection and alarm assessment. FLIR.Go to sp.hotims.com and enter number 306 for product information.

    We care.Staying with you all the way.

    www.axis.com/support

    Electronic security that secures more business.

    Schlage NDE wireless locks with

    ENGAGE technology open up a

    whole new business opportunity:

    more doors. With NDE wireless

    locks, you can off er your clients

    the bene ts of electronic access

    control in interior spaces leading

    to higher client satisfaction and,

    of course, higher market share.

    Learn how to secure more doors at allegionengage.com/sp or call us at (877) 556-1272.

    Go to sp.hotims.com and enter 34 for product information.

    1214sec_c1_v2.indd 1 11/13/14 10:09 AM

  • Visit www.axis.com/support

    We care.Staying with you all the way.

    5

    Axis Technical Support provides efficient assistance for your Axis product from extended warranties and repair, to our Helpdesk and Chat. With 23 support personnel based locally in North America speaking 7 languages, and over 90 supportpersonnel across the globe speaking more than 15 languages, you can rest assured that youll receive assistance wherever you are, whenever you need it.

    ChatFAQ

    Helpdesk

    Phone

    Warranty

    RMA Extended Warranty

    Distributed by:

    Count on it.

    Go to http://sp.hotims.com and enter 9 for product information.

    Untitled-8 1 10/28/14 12:52 PM

  • Milestone Systems U.S.Tel: 503 350 1100

    Knowledge. Students at the world-leading Warsash Maritime Academy in the UK hone their seafaring skills through a realistic engine room

    simulator. Teachers use Milestone XProtect Professional software to monitor and listen to students from a separate room.

    These recorded two-hour training sessions help students graduate with a rst-class education. Proving

    again Milestone can solve problems that are more than security.

    Milestone XProtect is the worlds leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as video analytics. Which means your possibilities are unlimited and you can keep your security options open.

    See our new products and the new ways to use XProtect at: www.milestonesys.com

    Morethan security

    Go to http://sp.hotims.com and enter 39 for product information.

    Untitled-5 1 11/5/14 3:38 PM

  • 4 1 2 1 4 | S E C U R I T Y P R O D U C T S

    www.security-today.com CONTENTS DECEMBER 2014

    FEATURES

    Industry Trends 14Nostalgia has No Place in Video SurveillanceWhy IP video will eventually supplant analog technologyBy Fredrik Nilsson

    Growth and Trends 226 Trends Impacting Access Control and the Overall Security MarketIncreased emphasis placed on interoperability and total cost of ownership in security purchasing decisionsBy Jeremy Krinitt

    Growth and Trends 28Me Too ProductsBeing wise about the products you present to end usersBy Ian Johnston

    Utility Security 44Substation Security ChallengesApplying smart thermal technology to prevent intrusionsBy John Romanowich

    Internet of Things 48Embracing the Internet of ThingsOpportunities and implications for security and beyondBy Jeremy Brecher

    PRODUCT SECTIONS

    New Product of the Year 32

    Readers Choice 46

    DEPARTMENTS

    Industry Focus 8Planning for the FutureBy Ralph C. Jensen

    Industry Vertical 10The Truth about FisheyeDewarping and how to use itBy Thomas Carnevale

    Top Picks 12

    New Products 50

    Advertisers Index 57

    Industry Professional 58Never AgainBy Ralph C. Jensen

    t 2014 READERS CHO

    ICE tt 2014 READERS C

    HOIC

    E t

    SECU

    RITY PRODUCTSSE

    CU

    RITY PRODUCTS

    Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

    Copyright 2014 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to Permissions Editor, c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

    The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the readers sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

    1214sec_004_TOC_v2.indd 4 11/13/14 11:29 AM

  • Actual images

    2014 Sony Electronics Inc. All rights reserved. Reproduction in whole or in part without written permission is prohibited. Features and specications are subject to change without notice. Sony and Exmor are trademarks of Sony. ImmerVision Enables and Panomorph are trademarks of ImmerVision.

    Say farewell to poor resolution at the image periphery. Say hello to Sonys SNC-HM662. Tightly integrating Sonys 5 megapixel Emxor CMOS sensor to an ImmerVision Enables Panomorph 360 lens that enables up to 30 percent more pixels than a traditional sheye lens, the camera minimizes blind spots. Youre also free to create multiple view windows with full electronic pan, tilt and zoom in real time or after the fact. So you can track, detect and analyze as never before. Experience the SNC-HM662 hemispheric view camera for yourself. And leave the sheyes to the sh.

    Learn the Five Essentials of Surveillance Cameras at sony.com/security.

    Trade your sheye for a birds eye.

    s.

    Go to http://sp.hotims.com and enter 2 for product information.

    Untitled-6 1 10/21/14 3:39 PM

  • 6 1 2 1 4 | S E C U R I T Y P R O D U C T S

    Another One in the Books

    As 2014 comes to an end, Id like to take the time to say thanks to every-one who contributed to our expert quotes, feature articles, blogs, Online Exclusives, and the list goes on. Our magazine and Website would not be the same without you. The coming

    year holds great promise, and I cant wait to discover what the security industry has in store for all of us. As always, if youd like to submit an Online Exclu-sive or if you have some new ideas, please feel free to give me a call or send an email. I look forward to working with you in 2015.

    Our REACTION blog addresses current events and receives great feedback from our active online community. Wed like to invite you to check out our recent posts and share your thoughts.

    If youre interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.

    Best Regards,

    Lindsay Page

    Online Exclusives

    Key Management Systems Enhance Key and Lock ApplicationsBy Fernando Pires

    Keys and locks are one of the most reliable and effec-tive physical safeguards available in todays security marketplace. They offer both prevention and protec-tion, are easy to install and maintain, and have a mini-mal investment cost. Advances in key/lock design and technology have helped to reduce security issues such as key duplication, key bumping and lock picking.

    Using Bluetooth-Enabled Devices as the Key to Remote MonitoringBy Steve Spatig

    Bluetooth technology is commonly used in a variety of applications to sync intelligent devices such as smartphones, wireless headsets and health trackers, to networked computers. As the desire to con-nect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security as well.

    The Rise of the Machines: M2Ms Role in Transforming Business and SecurityBy Rod Montrose

    Machine-to-Machine (M2M) devices and their in-nate power to communicate are transforming the way every business in every industry operates today, prov-ing to save companies time, money and resources.

    http://security-today.com/01131

    Recent Headlines

    911 Tapes Reveal Teacher Tried to Stop Gunman

    Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

    The Future of the Connected Home with Z-Wave

    Key Management Systems Enhance Key and Lock Applications

    Cyberespionage Group Targets Execs through Hotel Networks

    http://security-today.com/news

    Upcoming Webinars

    Access Granted: Access Control Checklist for 2015Join speakers from Avigilon as they provide you with actionable tips that will allow you to take your access control system to the next level in 2015.

    4 Steps to Reduce Third-Party Personnel RiskDiscover a systematic process for recognizing and minimizing identity-related personnel risks.

    Meeting the Challenge of Secure Visitor Management for Secure Government FacilitiesJoin us for this FREE webinar as we detail the rea-sons why an enterprise visitor management system is absolutely necessary in todays government facilities.

    To view these Webinars at any time, please visit http://security-today.com/webinars.

    REACTION Blog Recent Posts

    Recent Survey Shows the Internet as a Double-Edged Sword

    Companies with Protected Data will Look to Spend More on the Cloud

    Armed Security Guard Fired After Riding Elevator with Obama

    Sensor Records Each Shot Fired from Police Officers Gun

    Members of our staff and guest bloggers take advantage of REACTION to add their own perspectives on a broad range of security topics and issues. If youd like to be a contributor, please contact Group Social Media Editor, Ginger Hill at [email protected].

    Online Communities

    Follow us on Twitter: www.twitter.com/SecProds

    Become a fan on Facebook:http://www.facebook.com/secprodonline

    Pin with Us:http://pinterest.com/securitytoday/

    Go to sp.hotims.com and enter 14 for product information.

    1214sec_006_eTOC_v2.indd 6 11/13/14 2:19 PM

  • nounhaving or serving a utilitarian purpose; capable of serving the purpose for which it was designed.

    POE Powered

    IP Based Architecture

    RFID Support/Smart Cards

    Access Control/Door Strike Control

    Real Time Video Notifi cations to Smart Phones

    www.icrealtime.com866.997.9009

    The doorbell redefi ned.

    Go to http://sp.hotims.com and enter 28 for product information.

    Untitled-2 1 10/21/14 1:18 PM

  • INDUSTRYFOCUS By Ralph C. Jensen, Editor-in-Chief

    8

    www.security-today.com

    Volume 18, No. 12

    EDITORIAL STAFF

    Editor-in-Chief/Associate Publisher Ralph C. Jensen

    E-news Editor Brent Dirks

    Senior Editor Lindsay Page

    Content Development Matt Holden

    ART STAFF

    Art Director Dale Chinn

    PRODUCTION STAFF

    Director, Print and Online Production David Seymour

    Production Coordinator Teresa Antonio

    EDITORIAL ADVISORY BOARD

    Thomas Carnevale, president/CEO, Sentry 360

    William Crews, President/CEO, Security & Resilience Consulting, LLC, Houston

    Merlin Guilbeau, Electronic Security Association, Irving, Texas

    Robert Hile, director of strategic accounts, Sure View Systems

    Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

    SALES

    Randy Easton 904-261-5584

    Brian Rendine 972-687-6761

    Sam Baird +44 1883 715 697

    Jane Dai +86-755-26289889

    Peter Kao +886-2-2949-6412

    SECURITY, SAFETY, AND HEALTH GROUP

    President & Group Publisher Kevin OGrady

    Group Circulation Director Margaret Perry

    Group Marketing Director Susan May

    Group Website Manager Scott Newhouse

    Group Webinar Administrator Tammy Renne

    Group Social Media Editor Ginger Hill

    Chief Executive Offi cer Rajeev Kapur

    Chief Operating Offi cer Henry Allain

    Senior Vice President & Chief Financial Offi cer Richard Vitale

    Executive Vice President Michael J. Valenti

    Vice President, Erik A. LindgrenInformation Technology & Application Development

    Vice President, Event Operations David F. Myers

    Chairman of the Board Jeffrey S. Klein

    REACHING THE STAFF

    Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

    E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]

    Dallas Offi ce (weekdays, 8:30 a.m. 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

    Corporate Offi ce (weekdays, 8:30 a.m. 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

    Planning for the FutureBusiness planning for 2015 likely started a long time ago. I know it has for the publishing in-dustry, as we keep our editorial calendar up-to-date each quarter. It wont be long before the fi rst quarter of 2016 is updated on our website.

    The same is true for the security industry. Planned upgrades and new products have been released throughout the year. December, however, is the per-fect time to review what some of the industry analysts have to say about the coming year.

    The good news is that the physical security market continues to grow.

    According to IMS Research, there is still strong market demand in what is described as an increas-ingly competitive physical security equipment and services industry. The market reached $120 billion in revenue during 2013, which refl ects a 10.8 percent increase, compared to 2012. The United States re-mains the largest country with $6.5 billion spent on equipment. China, however, is closing that gap each year, where one in every $5 spent on physical security equipment in Asia is for a government building, not including state-led facilities and installations such as airports or infrastructure.

    As global economic conditions continue to im-prove and budgets slowly increase, the physical secu-rity industry continues to perform strongly across the world, the IMS Research report stated. Growth in the number of projects employing different types of physical security equipment as a single solution is also increasing, often managed through the same platform.

    Physical security remains a competitive market, and while global revenues for equipment and services continue to increase, expectations that the industry supply market would begin to consolidate seem pre-mature. The top 15 manufacturers and service pro-viders accounted for only 22 percent of the market in 2013, a decrease of 3 percent from just a year ago. In fact, no one can boast more than a 5 percent market share, showing how fragmented this growing industry truly is, and that there are high levels of competition.

    Asian-based manufacturers are gaining market share outside of their domestic markets. Last year, four of the top 10 equipment manufacturers globally were in Asia. They have improved product quality and are starting to expand to new markets. This also means increased price pressure on the American and EMEA markets. Price pressures are not strong enough to outweigh the increases in general market demand, so there is consistency for strong growth in the foresee-able future, especially in the following sectors:

    Ethernet switch manufacturers. There are new, fast-growing markets where Ethernet switch manufactur-ers can diversify. Data from ISH Research shows that

    606,000 Ethernet switches were sold for use in video surveillance deployments in 2013. This is but a small portion of the Ethernet switch world right now.

    The forecast for Ethernet switches is that by 2018, there will be some 1.6 million units sold, representing a much larger portion of the market. IHS estimates that 24 port switches are the most widely-used in video surveillance applications and Ethernet switches used in video surveillance revenue are estimated at $188.2 million.

    A number of Ethernet switch manufacturers have been quick to capitalize on the growth in this market and have started producing solutions tailored specifi -cally for video surveillance, IMS Research reported. Two such notable moves were the launch of Avayas Fabric Connect solution, and the strategic partnership between Extreme Networks and Milestone Systems.

    Smartcards. Global shipments of smartcards are expected to rise by 2.1 billion from 2014 through 2019. Smartcard shipments in 2019 will rise to 10.9 billion units, up from 8.8 billion in 2014.

    The key end-user sectors that will drive growth over the next fi ve years include payment and bank-ing, e-government, healthcare and transportation, said Don Tait, senior digital and ID market analyst at IHS. The market will expand despite declines in subscriber identifi cation cards (SIM), which are used in mobile phones. Slowing growth in mobile phones will cause SIM card shipments to fl atten or decline.

    Asia also plays a key role in the overall smartcard market. China, India and Indonesia will be a huge part of the growth of the smartcard market over the next fi ve years, and electronic passports are contribut-ing to high volumes in the Asian market. The Asian-Pacifi c region accounted for the highest number of ePassport shipments in 2013.

    PERS. The North American personal emergency response systems (PERS) market is forecast to grow from $700 million in 2014 to $1.5 billion in 2019. The main market driver in this vertical is a growing elderly population, increasing the use of mPERS. However, as the United States moves away from the POTS-based communication in the home, mPERS will grow substantially.

    It seems to me that 2015 is the year weve all been waiting for since 2008, when the economy began a nose dive. Overall unemployment in the United States is declining, and with more people back to work, there is a greater need for high-tech security systems.

    Many companies have been planning for the worst and hoping for the best. It seems the time to hope is over; the time to perform is now at hand.

    1214sec_008_IndFocus_v2.indd 8 11/13/14 9:57 AM

  • Video Insight v6 now withaccess controlFREE!The new Video Insight v6 is now bundled with MonitorCastEDU, an enterprise access control application designed for the education market. Video Insight recognizes the unique security, budgetary and infrastructure challenges faced by educational institutions. The new v6 leverages existing network infrastructure and Mercury-based access control system and provides necessary features to enhance your campus security with no additional cost.

    .H\%HQHWVRI0RQLWRU&DVW('8

    Unlimited scalability No limit for the number of doors, administrators, or simultaneous connections No hardware purchase required from Video Insight Its FREE of charge with Video Insight Server v6 or Advidia Cameras (each camera license is bundled with a door license.) Support Mercury access control boards No client or server licenses required Zero recurring access control fees with current Video Insight SUP It runs on your existing Video Insight Server

    For more information visit us at: www.video-insight.com/access-control.phpGo to http://sp.hotims.com and enter 24 for product information.

    Untitled-2 1 11/7/14 10:49 AM

  • 1 0 1 2 1 4 | S E C U R I T Y P R O D U C T S

    As most in the video sur-veillance industry know, traditional video sur-veillance cameras have an inherent fl aw: blind

    spots. For example, if a fi xed fi eld-of-view camera is pointed left and an inci-dent occurs on the right, then the camera is useless. So, couldnt we just double or triple the number of cameras used in ev-ery cafeteria and parking lot in order to capture every angle? Sure, but then users are forced to incur extra hardware costs, installation costs, software licensing and added maintenance expenses.

    With demand for comprehensive se-curity increasingwhile corresponding budgets decrease or stay the samethat is not a practical solution. This is why Sentry360 has made obtaining an afford-able, true, 360-degree-view a technology that is accessible to the masses. Look-ing at a pure fi sheye image might be a novel perspective, but when it comes to a security professional investigating, it becomes something to decipher. A 360 fi sheye allows the curved fi sheye affect to become corrected, like looking at a normal camera through a process called dewarping; however, this is only half the battle. Lets put this into context relative to the current state of the market.

    The MarketThere has been a big boom in the past few years with manufacturers producing cameras with fi sheye lenses. The reality is that many of these products came to market to fi ll a gap in said manufac-turers product-line, which often times is an imitation not an innovation. Many in the 360-degree sector believe that all they have to do to achieve full coverage is at-tach a fi sheye lens to an IP video camera andvoila!they will receive full cover-age. Not so. If you dont have the ability to fi rst dewarp then allow full PTZ in live and recorded 360-degree fi sheye images, then the result is a product that may be misleading to an end-user.

    The majority of these recent entrants to the fi sheye market do allow dewarp-ing through a common DSP chip manu-facturer Ambarella, but theres a catch: The user must dewarp the stream in-

    camera coming into the VMS which is typically 20 to 30 percent of the overall fi sheye, leaving 70 to 80 percent unre-corded. To reduce blind spots, the user can repeat this process, adding multiple dewarped streams from the camera at different angles, but this could, in some cases, increase bandwidth and storage, or add software licenses and increase power consumption from the camera. Through-out this restricted process, it eliminates the ability to PTZ the dewarped single stream view in recorded video, which should ultimately be the sole purpose for choosing this breed of technology.

    The following will help users under-stand best practices, positioning and applications for this technology with one common goal: to capture the larg-est amount of information with the least amount of cameras (sensors) from a sin-gle vantage point.

    The Application: Ceiling Mount with 360 Technology

    This is the North, South, East and West approachwith everything in between. 360cameras are designed to capture a full half of circle and to be mounted on the ceiling looking straight down so it can capture, record and reproduce cor-rected perspective PTZ windows in re-corded or live video. The optimization of the Sentry360 dewarping technol-ogy reduces the amount of total single fi eld-of-view cameras you will need to cover heavy traffi c or open areas within schools, banks, retail, assembly lines, busses, trains, airports and more.

    The DOs:1. Mount in a ceiling using a surface-

    mount mini dome or fl ush-mount (dis-creet accessory) with a drop ceiling.

    2. Make a clear decision at what radius

    image quality is needed. Think de-tection vs. identifi cation. Results will vary depending on how high the cam-era is mounted and how far away the subject is from the camera.

    3. Plan for evenly distributed lighting. If part of environment is poorly lit that section of the image will be affected.

    The DONTs:1. Do not mount the 360camera in a

    corner. This reduces its effective cov-erage. Ensure the camera is mounted in intersections or heavy traffi c areas in open spaces.

    2. Because its a 5MP sensor, do not expect that a dewarped section will be that same resolution. A single dewarped view can be, depending on what native resolution of the camera, VGA or less, based on how much the user digitally zooms.

    The Application: Wall Mount with 180

    This is taking the fi sheye and wall mount-ing it for a desired 180 viewing angle (east to west). As opposed to stitching multiple sensors, for this application, the fi sheye is displayed in one full panoramic view in your VMS of choice. Users can then digitally zoom into this view for a more detailed perspective. Because of the use of a fi sheye and to minimize distor-tion, the best portions of the image are sectioned off for display, and eliminate the unimportant sections such as the sky, for example. The panoramic view is in-tended to be an overview shot and will provide users a camera reduction solu-tion with a single installation point. Ap-plications include sides of buildings and parking lots, retail checkout counters, stairwells, hallways (T intersections) and bus/train platforms.

    The Truth about FisheyeDewarping and how to use itBy Thomas Carnevale

    Thomas Carnevale is the president of Sentry 360.

    1214sec_010_011_IndVert_v4.indd 10 11/13/14 11:31 AM

  • W W W . S E C U R I T Y - T O D A Y. C O M 1 1

    The DOs:1. Ensure the 180 is mounted in the

    middle of the environment, cen-tralizing its perspective view to evenly distribute the image quality throughout the panoramic image.

    2. Make a clear decision on what mounting height as this effects the overall pixel density of the image.

    3. For higher mounting, ensure that the 180 has the ability to point downward, either with the outdoor housing or mini-dome lens gimbal, as not to record unnecessary infor-mation such as clouds or the ceiling.

    The DONTs:1. Do not mount the camera where large

    obstructions can cause blind-spots.2. Do not use this as a replacement for

    optically-zoomed PTZ for license plate capture. The 180 panoramic view is designed to be an overview scene.

    The Application: Table, Counter, Floor and Vehicle 360 TechnologyThis is using the 360 with a completely different algorithm that weve named InVerted360, and could even call for applications users havent been think-ing about. When mounting the cam-era on a surface, table, counter or fl oor looking upward, the perspective chang-es. In a conference room, for example, you can navigate to the speaker or pre-senter and interact with others in the meeting room while being on a remote connection. In a retail or cash counting application by mounting or embedding the camera in the counter, users get a closer, more interactive perspective. It even has applications in gaming tables for blackjack or poker to have a table-level perspective of the full interaction between players and dealers.

    To deliver the full functionality of 360 fi sheye technology, Sentry360 has developed a software development kit (SDK) customized for VMS develop-ers and NVR manufacturers. IP video surveillance has evolved into an eco-system that allows the users to choose best-in-breed technologies to create a full, customized solution for the end-user, based on their application. Over the years, we were forced to adapt our SDK to work within a variety of differ-ent software environments, languages and operating systems. To date, we feel that our SDK is the most integrated, fl exible and customizable, enabling the future of this technology to not be

    limited. We boast that our SDK works with any operating system and software platform/language, and is ready to scale with any resolution as fi sheye lenses improve and Ultra-HD becomes more common place.

    The Sentry360 SDK has given se-curity providers the tools necessary to

    record and display the full 360 fi sheye image, and then in live or playback, correct the view for a full retrospec-tive PTZ in all directions. The point of 360 is to enable that PTZ experience with the ability of hindsight in full 360 degrees, all while providing full situ-ational awareness.

    With nearly 30 technology integra-tions to date, Sentry360 has laid the ground work to optimize the future of this technology and has laid a path for future quality improvements for scaling in resolution and compression while opening the door to new appli-cations.

    This solution is

    available directly from

    DM Network Video

    Effective early FIRE DETECTION for high value assets

    Theres more to Dedicated Micros...

    ask about our IP network video solutionsCal l 1-877-367-8778 or v is i t

    www.dm-networkvideo.com

    Copyright AD Group 13th October 2014

    FireVu Visual Smoke Detection (VSD) reliably detects smokeand ame at source and enables a fast, speci c response.

    A solution that provides early detection of ame and smoke anywhere within the visual eld both inside and out.

    Live and recorded video helps to direct re protection professionals when danger arises and enables forensic analysis.

    Absolute temperature sensing, VSD and ame detection combined in new multi-detector. Detect and differentiate between combustible and normally high temperature and visually verify.

    Monitoring and visual veri cation of a re that can be conducted equally effectively on-site or remotely.

    Fully tailored masking and zoned detection screens out unwanted areas of view and enables double knock detection.

    A re detection solution managed from a single GUI alongside NetVu Connected security video.

    FireVu has successfully been used to protect demanding industries including: high value property, petrochemicals facilities,manufacturing and food processing plants, air hangars, tunnels, recycling and waste management sites.

    Go to sp.hotims.com and enter 13 for product information.

    1214sec_010_011_IndVert_v4.indd 11 11/13/14 11:31 AM

  • 1214 TOP PICKS Compiled by Security Products Staff

    1 2 1 2 1 4 | S E C U R I T Y P R O D U C T S

    Zebra TechnologiesFast, yet reliable performance

    The Zebra ZXP Series 7 produces vivid cards with precise color control.

    The printer is ideal for these verticals: health-care, higher education, hospitality and retail.

    The printer features the low cost of ownership coupled with operational effi ciency.

    Superb photo-like image quality comes with every printed card.

    Security features include lamination options. The ZXP Series 7 card is perfect for employee

    ID and access control applications.Zebra Technologies.Go to sp.hotims.com and enter number

    354 for product information.

    Ultra Magicard100 card capacity input hopper

    The Rio Pro single-sided card printer is a di-rect-to-card printer ideal for mid to high vol-ume card printing applications.

    The unit has the following Print speeds: 23 sec-onds for color and 6 seconds for monochrome.

    Built-in visual security is included with stan-dard or custom HoloKote to print a watermark at no extra cost.

    Standard USB & Ethernet connectivity are available.

    The printer is fi eld upgradable to duplex print-ing with a simple drop-in ribbon.

    Optional upgrades include: magnetic and smart card encoding, extended warranty and loaner coverage plans.

    A 3-year warranty on printer and printhead is also availableUltra Magicard.Go to sp.hotims.com and enter number

    355 for product information.

    Team NiSCAHigh speed, low cost

    The NiSCA PR5350 offers a small foot-print, 24-bit color, 256-grayscale, security lamina-tion, encoding options and prints at the as-tounding speed of over 164 cards/hour and 16MB of memory.

    The PR5350 is available with options for Mag-Stripe, IC Chip, RFID reading and encoding similar to the PR5310s options; and also secu-rity lamination with the addition of the PR5302 laminator.

    Variable UV printing is available for creating an additional security layer.Team NiSCA.Go to sp.hotims.com and enter number

    356 for product information.

    EvolisCapitalizing on retransfer

    card printing

    AVANSIA, the latest in card printers from Evolis, capitalizes on retransfer card printing, a technol-ogy that is proven to deliver top-notch quality.

    With retransfer, card printing is performed in two steps: fi rst, the card layout is printed on a transparent fi lm; then the print layer is trans-ferred from the fi lm to the card.

    This technology makes it possible to cover the entire surface of the card.

    Avansias 600dpi print head delivers vivid quality images, as well as sharp texts, micro-prints and water marks.Evolis.Go to sp.hotims.com and enter number

    357 for product information.

    HID GlobalSuperior print quality and encoding

    HID Globals FARGO HDP5000 high defi nition printer/encoder provides superior print quality, high reliability, durability and greater security when producing ID badges and creating/encod-ing secure identities across.

    The solutions built-in iCLASS SE Encoder al-lows one-step, inline encoding of secure iden-tity data onto the industrys most common credential technologies, including HID Prox, standard iCLASS, iCLASS SE, Seos, MIFARE, MIFARE DESFire EV1 and future technologies.

    The printer/encoder solution can also use high durable fi lm ribbons to provide longer card life and three times the durability, without needing an added laminator.HID Global.Go to sp.hotims.com and enter number

    350 for product information.

    Zebra TechnologiesDurable and abrasion-resistant

    cards

    The Zebra ZXP Series 8 is a retransfer card printer, providing industry-best throughput while achieving superior, photo-like image quality.

    It is ideal for high-security ID applications that require durability and abrasion-resistance.

    The Series 8 is able to print on uneven sur-faces, such as smartcards.

    This print can be used for government-issued driver licenses and for high security ID cards.

    Fraud protection is easy, since the fi lm is in-herently tamper-evident.

    True edge-to-edge printing is offered, via over-the-edge printing.

    The cards can be used as instant issuance bank cards.Zebra Technologies.Go to sp.hotims.com and enter number

    351 for product information.

    iDP Corp.High capacity card printing

    capabilities

    iDP Corp is announcing the much anticipated launch of the IDP SMART-70 Series that comes in December 2014.

    The SMART-70 offers high capacity card print-ing capabilities with a unique modular construc-tion for easy upgrades, service and shipping.

    With a 500 card input hopper, ink ribbon ca-pacity and optional exit hopper, the system is suited to users who have high-capacity needs, or for end-users who would like to secure their credential media in the securely locked printer.

    Optional lamination and high-speed printing complete the package.iDP Corp.Go to sp.hotims.com and enter number

    352 for product information.

    DatacardStandard USB and

    Ethernet connectivity

    The SD260 is a single-sided direct-to-card ID card printer ideal for low- to mid-volume card printing applications.

    TrueMatch printing technology creates vibrant colors and crisp card printing results.

    Fast print speeds: the datacard creates 200 color cards and up to 850 monochrome cards per hour.

    A manual feed option to print ID badges on the spot is available.

    The anti-jam card handling system creates a smooth printing process.

    Optional upgrades include: encoding, 100-card output hopper and extended warranty plans.

    A 30-month printer and printhead warranty is available.Datacard.Go to sp.hotims.com and enter number

    353 for product information.

    1214sec_012_Toppicks_v2.indd 12 11/13/14 9:59 AM

  • Good things DO come in small packages, like full HD 1080p 2.1MP cameras. Speco has launched a new line of mini-bullet and mini-dome IP cameras that are perfect for covert or aesthetic-sensitive applications. Separate camera and encoder units allow for flexibility and easy placement up to 15 apart. With built-in standard PoE, WDR operation, 2-way audio communication, and micro SD card slots - these cameras

    are perfect indoors or outdoors. Dont let their size fool you, these cameras deliver full HD 1080p resolution, are ONVIF compatible, and available in dark grey or white housings.

    Good things DO come in small packages, like full HD 1080p 2.1MP cameras. Speco has launched a new line of mini-bullet and mini-dome IP cameras that are perfect for covert or aesthetic-sensitive applications.SSeparate camera andd encodder uniits lalllow ffor flfle ixibibilility a dnd easy placement up to 15 apart. With built-in standard PoE, WDR operation,2-2-wawayy auaudidioo cocommmmununicicatatioionn, a andnd m micicroro S SDD cacardrd s slolotsts - - t thehesese c camamererasas

    are perfect indoors or outdoors. Dont let their size fool you, these cameras deliver full HD 1080pp resolution,, are ONVIF compap tible,, and available in dark ggrey y or white housinggs.

  • 1 4 1 2 1 4 | S E C U R I T Y P R O D U C T S

    INDUSTRY TRENDS

    NOSTALGIA HAS NO PLACE IN VIDEO SURVEILLANCEWhy IP video will eventually supplant analog technologyBy Fredrik Nilsson

    When network cameras fi rst appeared on the market in 1996 who could have imagined this fl edgling technology ever gaining a toehold in an industry dominated by analog cam-eras? Fast forward to today and one marvels at how much IP video has transformed the surveillance landscape.

    In fact, market projections show that 2014 will be the year when IP video clear-ly surpasses the dollars spent on analog surveillance technology. What makes this all the more signifi cant is that IP video is only reaching 30 percent of todays chan-nels, which means there is enormous opportunity for further market growth.

    WHY IP IS GAINING IN POPULARITYThere are a number of factors propelling the industry to supplant long-entrenched analog with more advanced IP video systems. Foremost is image usability. Reso-lution has progressed from a mere CIF resolution (352x240 pixels) to stunning multi-megapixels and full HDTV clarity. Superior H.264 compression standards and greater in-camera processing power have changed streaming from a few jerky frames per second to a smooth 30 frames per second, and in some instances even up to 60 frames per second.

    The constrictive 4:3 aspect ratio refl ective of old CRT computer screens has been replaced by an expansive 16:9 ratio to complement the widespread adoption of widescreen HDTV monitors, a carryover from the home entertainment market.

    Open standards afford another advantage. With so many business applications operating on the network, users have come to expect open platform architecture from all their IT products. IP video delivers.

    Instead of being locked into proprietary DVR-based analog solutions, IP-based video surveillance systems allow users to pick and choose the best components for their environment. They can integrate storage, fi ber network and switch, operating systems, processors, network cameras and video analytics from multiple vendors with cost-saving off-the-shelf components. Because each component adheres to open standards, systems integrators can interconnect all the elements into a single cohesive system and replace or update components at will. This allows users to acquire ever-increasing functionality and performance throughout the life of their surveillance system and extend the return on their original investment.

    Remote accessibility also has contributed to IP videos growing acceptance. As a network-based system, video cameras and storage can be accessed over the web. Unchaining security from their desktops and enabling them to view cameras live

    1214sec_014_020_Nilsson_v2.indd 14 11/13/14 10:00 AM

  • Superior identicationLower costs

    Get 4K ultra HD images with lower bandwidth and storage requirements. DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging lighting pervade the scene. And, intelligent Dynamic Noise Reduction minimizes bit rates to lower bandwidth and storage requirements up to 50%, reducing system costs and network strain. This makes 4K ultra HD imaging relevant for many surveillance applications, enabling you to see every detail, everywhere.Learn more at www.boschsecurity.us

    Go to http://sp.hotims.com and enter 5 for product information.

    Untitled-5 1 5/14/14 1:01 PM

  • 1 6 1 2 1 4 | S E C U R I T Y P R O D U C T S

    INDUSTRY TRENDS

    from remote devices like smartphones and tablets de-livers unprecedented situational awareness wherever the user may be. It also means that integrators and service providers can troubleshoot, service and up-grade systems remotely, saving the expense and delay of an on-site service call.

    CEMENTING IP VIDEOS PLACE AS A FRONTRUNNER As with all technological innovations, IP video con-tinues to evolve. With that evolution, high-end fea-tures are swiftly permeating the market at ever more affordable price points. Take, for example, Lightfi nder technology that delivers full color even at night under poor lighting conditions. The advanced image pro-cessing and in-camera software required to produce life-like color in HDTV resolution without artifi cial illumination cost $999 when it fi rst debuted in 2011. In 2014, the price has dropped to $699.

    The same economies apply to the wide dynamic range with dynamic capture feature that solves the problem of delivering a usable image in a scene com-prised of both deep shadows and bright light. When the technology debuted in 2012, it sold for $999. To-day, cameras featuring both Lightfi nder and the latest wide dynamic range innovationWDRForensic Capture start at $1,099.

    Built-in optimized infrared LED is another exam-ple. Built into the camera itself, these LEDs are power effi cient and automatically direct IR light exactly where the camera is pointed so that the illumination angle automatically synchronizes with the remote zoom. They produce less heat than their predecessors and therefore generate far less image noise. Unlike old IRs that burn out in a few short years, these new IR LED lights last at least seven years, even if used 24/7. Cameras with built-in IR LEDs fi rst came on the market in 2012 for an already attractive cost of $499.

    Given all of IP videos advanced capabilities, it is no wonder that nostalgia for grainy, proprietary ana-log surveillance systems is sharply waning.

    ACCELERATING GROWTH AT BOTH ENDS OF THE MARKETIP video is a far more scalable technology than DVR-based systems, which makes it ideal for enterprise sur-veillancelarge corporations with multiple satellite offi ces or citywide surveillance systems. In fact, most enterprise installations with more than 100 cameras are IP systems. While quite a few systems in the world have more than 10,000 cameras integrated into a single surveillance network, there are even a few with more than 100,000 cameras. This level of scalability can only be possible with network-based technology.

    Despite the promise of IP video, there is still a high percentage of mid-size installations with between 10 and 100 cameras tied to analog technology. Their de-cision to cling to this older technology has been infl u-enced by integrators comfortable with the simplicity of installing and operating DVR systems. But with in-novations making network systems even easier to in-

    stall and use, security integrators are starting to shift their infl uence to IP.

    Analog also continues to dominate small system markets with fewer than 10 cameras due to the mis-conception that the old technology is the most cost-effective, least complex solution. But that perception is changing due to two important catalysts: cloud computing and low-cost, high-capacity on-board storage. In addition to making IP more affordable for low camera-count users, these innovations deliver the same technological advantages found in enterprise level systems, namely HDTV image quality and full scalability in single and multiple camera increments.

    HOW DO THEY WORK?Cloud security. Also known as hosted video or video as a service limits a users surveillance system investment to network cameras and a secure Internet connection. The user pays a service provider a monthly fee to store the recorded data in the cloud and maintain system components remotely, eliminating the need for onsite storage hardware as well as in-house technical exper-tise to manage, troubleshoot, upgrade and service the system. This shifts the bulk of the surveillance budget from a hefty upfront capital investment to a more af-fordable monthly operating expense. A hosted video operating model can also easily tie into a monitoring service, enabling an alarm operator to visually verify an event before calling responders to the scene.

    SD memory cards. They equip IP cameras with highly-effi cient, programmable internal storage. A ro-bust technology that can be accessed remotely over a network, an SD card eliminates the cost of an onsite server, DVR, NVR or PC to house the recorded video. Basic SD cards range in capacity from 64MB to 4GB. SDHC cards offer more storagefrom 8GB to 32GB. SDXC cards start at 64GB and can go as high as 2TB of storage. Instead of consuming bandwidth stream-ing video to an external storage device, the on-board storage can be accessed remotely over the network. When used in conjunction with hosted video, users gain the best of both worlds: having a monitored ser-vice and minimizing bandwidth consumption by stor-ing most video on the camera itself.

    MAKING SMARTER USE OF VIDEO SURVEILLANCEIn the early days of surveillance, cameras were pri-marily installed as a deterrent to crime. In the last decade, surveillance has advanced to a forensic stage whereby video was tagged and viewed to identify de-tails of an incident after it occurred. Most recently, were seeing a shift from that reactive use of video to a more proactive use through real-time analysis.

    Foremost is using intelligent analytics to bring the most relevant video to the foreground so that the operator can direct attention to a certain area as an incident unfolds or shortly thereafter. Some of those analytics include: Cross-line detection: sending an alert when a per-

    son, vehicle or object crosses a perimeter

    Go to sp.hotims.com and enter 15 for product information.

    1214sec_014_020_Nilsson_v2.indd 16 11/13/14 10:00 AM

  • keeping focused

    Honeywell is committed to keeping you focusedno matter what size the installation

    On every job you do, youre focused on getting the best image possible with the

    most affordable camera available. Check out Honeywells open, expanded line of

    equIP Series camerasweve added 14 new cameras to the family! Our equIP

    cameras provide crisp, high quality resolution so users can see objects in greater

    detail. Users can now zoom in from greater distances, which means they can use fewer cameras to cover a

    larger area than lower resolution cameras. The equIP Series now includes new models including 3 and 5 MP

    camerasso theres a complete range of IP camera solutions for every application. From the simplest to the

    most complex, whatever functionality your installation calls for, you can rest assured that Honeywell has an

    IP camera that focuses perfectly on the task at hand!

    To see more clearly, call 800.323.4576 or visit www.honeywellvideo.com to learn more. 2014 Honeywell International Inc. All rights reserved.

    Go to http://sp.hotims.com and enter 33 for product information.

    Untitled-2 1 11/7/14 10:46 AM

  • INDUSTRY TRENDS

    1 8 1 2 1 4 | S E C U R I T Y P R O D U C T S

    Motion detection: sending an alert or initiating a video recording when there is movement in the fi eld of view

    People and vehicle counting: tracking the volume of foot and vehicular traffi c to manage location ca-pacity

    License plate recognition: converting license plate images to OCR data for easy retrieval

    Line management: triggering an alert when the number of people in line exceeds a specifi c numberNow that intelligent video has proven itself in se-

    curity, its use extending into other areas of the busi-ness as well. Some of the typical retail and industrial applications for video analytics include: Dwell time analysis at merchandising displays Demographic analysis of shoppers by product cat-

    egory Stock replenishment review Video verifi cation of cash register transactions and

    vendor deliveriesBecause IP video is network-based technology, it

    can be seamlessly integrated with other physical se-curity information management systems (PSIM) for more complete protection of people and property. Adding video verifi cation into the mix affords a num-ber of advantages:

    When THE POWER IS IN THE KEY you have the ability to . . .

    Control access to every lock

    Eliminate re-keying costs

    Reduce unauthorized entry

    Monitor and report all access activity

    Learn more at www.cyberlock.com/lock4 541-738-5500 [email protected]

    CyberLock

    Go to sp.hotims.com and enter 7 for product information.

    Audio MonitoringBy Richard Brent

    With the increasing number of security breaches, whether a cyber-attack or a campus break-in, end users are looking for integrated solutions that will provide new security services. One of the technologies that integrators and end users have directed their attention to is audio.

    Audio is a valuable feature that complements traditional visual security systems by providing ad-ditional evidence and verifi cation. It plays a vital role in substantiating claims and incident reports. For example, when a police offi cer receives a dispatch from the local convenience store, he can listen to the

    audio recording to confi rm whether its a false alarm or a precarious situation that requires backup. More integrators and end users are capturing the value of audio by installing this technology in their applications. Audio

    will become more widespread, as the demand for delivering integrated security solutions to the end user increases. The perspective of the legality of deploying audio will also transition from grave objection to properly managing expectations of privacy.

    The security industry will adopt more audio monitoring in the future; however, here are the top trends in audio monitor-ing from 2014:

    1. Greater IP integration: More audio devices are being connected to a network or integrated into an IP camera sys-tem, allowing the end user to listen and speak to people from a remote location.

    2. Distinguished feature in security systems: Integrators are offering audio monitoring as a way to provide a more turnkey security solution for the end user and to differentiate their services from competitors.

    3. Increased use in the transportation industry: Several entities in the transportation sector, such as the New York Metropolitan Transportation Authority as well as school districts on the East Coast, are moving to install audio monitoring on trains and school buses to increase safety, reduce bullying and provide additional verifi cation in the event of an accident.

    Richard Brent is the CEO of Louroe Electronics.

    1214sec_014_020_Nilsson_v2.indd 18 11/13/14 10:24 AM

  • Maximum legal transmit power - 1 Watt

    RF data rates up to 866 Mbps

    Up to 540 Mbps Ethernet data rate

    Line of Sight Range up to 30 miles

    3-Port POE out 802.11at option

    TRY OUR NEW HIGH SPEED800 MBPS ETHERNET SOLUTIONS

    SECURE WIRELESS SOLUTIONS FOR INDUSTRIAL APPLICATIONS

    NEED HELP WITH AN OUTDOOR WIRELESS CONFIGURATION?

    Try our new wireless solution selector tool at www.avalanwireless.com

    (866) 533-6216www.avalanwireless.com

    Leaders in Wireless IP Video Connectivity

    Go to http://sp.hotims.com and enter 27 for product information

    Untitled-8 1 11/10/14 4:52 PM

  • INDUSTRY TRENDS

    2 0 1 2 1 4 | S E C U R I T Y P R O D U C T S

    Video verifi cation on alarms: save on penalties for false alarms

    Access control systems: confi rm the identity of badge users

    Intercom systems: screen visitors be-fore unlocking door

    DELIVERING EVEN BETTER DETAILSThe next big game changer for IP video is Ultra HD, also known as 4K, which will bring even higher image quality to the table. Nearly four times the resolu-tion of HDTV 1080p, 4K adheres to

    the following standards: Resolution: at least 3840x2160 or

    8.3 megapixels Frame rate: up to 120 fps Aspect ratio: 16:9 Color fi delity: a much larger color

    palette than HDTVFor the surveillance industry this

    translates into an unprecedented level of detail, making it easier for security professionals to identify people, objects and incidents from greater distances.

    But with four times the resolution of HDTV comes at least four times the bandwidth consumption when stream-ing the video, and, of course, at least four times the volume of video data be-ing stored. Therefore the only way 4K to have any practical application, compres-sion technology will have to keep pace.

    To use 4K at full resolution and frame rate, H.264 advanced compres-sion technology requires a bandwidth of roughly 20-30 MBps. Compressing the video stream below 10 MBps sac-rifi ces frames per second, video quality or both.

    There is a new compression stan-dard on the horizon, however. H.265, also known as High Effi ciency Video Coding is the intended successor to H.264. A more effi cient compression algorithm, its designed to improve vid-eo quality and double the compression ratio of its predecessor. The standard was formally published in June 2013 and the consumer electronics industry anticipates products equipped with H.265 to reach the market by the end of 2014. But the transition to the video surveillance world is still several years out since the standard has to be incor-porated not only in video cameras, but also in all the associated components like graphics cards, video displays and video management systems.

    IP VIDEO CONTINUES TO HAVE FAR-REACHING POTENTIALIP video has come a long way from its rudimentary debut in 1996. As its lead-ing edge advantages over analog con-tinue to exceed expectationsat the enterprise, mid-size and small system levelsthe potential customer base for IP video continues to expand exponen-tially. This presents an attractive op-portunity for security integrators and installers looking for solutions that will benefi t all aspects of their customers operations.

    Fredrik Nilsson is the general manager for Axis Communications Inc. in North America.

    OPTIMIZED CERTIFIED GUARANTEED

    Thank you for another great year!

    Free Seneca Guide to xVault surveillance solutions products, download at info.senecadata.com/security-products

    Filled Product Gaps in the Market Low to Mid Level xVault NVR xVault Hybrid NVR for Analog/IP Pre-loaded xVault NVR with OnSSI 24/7 Live Support

    Expanded Strategic Partership Anixter Milestone OnSSI Samsung

    Brand Awareness ASIS ISC West Partner Connect PSA Security

    Seneca Data Distributors. Inc. | 7401 Round Pond Road | N. Syracuse, NY 13212 | p: 877.814.0348 | www.xvaultsecurity.comIntel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

    xVault systems feature the Intel Xeon processors.

    A new Intel-based PC starts in a ash, has the power to do more and is less expensive than you think.

    2014HIGHLIGHTS

    Happy Holidays fromthe Seneca FamilY

    Go to sp.hotims.com and enter 29 for product information.

    1214sec_014_020_Nilsson_v2.indd 20 11/13/14 10:00 AM

  • 4Like CO and Smoke in a single detector. The award-winning i4 Series Combination CO/Smoke Detector and i4 Interface Module work together to provide the rst system-connected combination solution for conventional re and security systems.

    The i4 Detector truly hits the spot for installers as well as homeowners. It uses the most reliable and accurate CO and Smoke sensing technologies to detect dangerous levels of smoke or CO. Ongoing maintenance is easy, thanks to its eld-replaceable CO cell. And the i4 Combination Detectors 2- or 4-wiredesign makes installation quick and easy, just like making a PB&J should be.

    The i4 system works with most conventional security panels, and the i4 Module even interconnects sounders on the loop. Plus, youll have the freedom to mix and match up to 12 i4 Combination Detectors and compatible i3 Smoke Detectors per i4 Module. Sink your teeth into a life safety solution that means less wire, less labor, and fewer devices on the wall or ceiling. To learn more visit:

    i4 Interface Module(Required)

    i4 CO/Smoke Detector

    Some things arejust great together.

    go.systemsensor.com/i4pbj-sp

    2014 System Sensor. All Rights Reserved.

    Go to http://sp.hotims.com and enter 11 for product information.

    Untitled-2 1 7/9/14 10:24 AM

  • 2 2 1 2 1 4 | S E C U R I T Y P R O D U C T S

    GROWTH AND TRENDS

    6 TRENDS IMPACTING ACCESS CONTROL AND THE OVERALL SECURITY MARKETIncreased emphasis placed on interoperability and total cost of ownership in security purchasing decisionsBy Jeremy Krinitt

    From 4K Ultra HD resolution surveillance cameras to near fi eld com-munication (NFC) or Bluetooth-enabled access control readers and applications, technology innovation in the security industry runs the gamut. However, while these newer technologies and the advanced functionality they offer generate a lot of buzz, the fact remains that

    todays end users and systems integrators are looking for much more in the securi-ty devices they purchase than just the latest and greatest features. Despite a slowly recovering economy, security budgets have yet to climb back to their pre-recession levels. As a result, end users and integrators must be able to show a tangible return on investment (ROI) on the security solutions they purchase.

    For many years, security operated within a silo, but that is quickly changing. Companies are now looking for security solutions that can be leveraged across different departmentshuman resources, facilities and moreand also provide long-term value to the organization. Additionally, it is no longer acceptable for security manufacturers to use a checkbox approach to the features they offer. More thought needs to be put into how the features of a product can be best uti-lized by customers. For example, a video surveillance company could develop a revolutionary type of analytic, but if the setup of that analytic is temperamental for integrators, then what difference does it make to customers looking to use that technology?

    Much of the industrys recent focus on innovation is around additional prod-ucts that can be added into the security environment, not on the fundamental value provided to integrators and end users. The question for the industry is this: What market factors and technology innovations are going to be the key to driving real growth moving forward?

    Here are few things that could play a big role in the industry in the not-too-distant future.

    OPENNESS AND INTEROPERABILITY The word open is thrown around frequently in the security industry, but it is typically used to describe a security system, such as access control, video surveil-lance or other solutions, that are interoperable with products from other vendors. Whole spectrums of possibilities exist when someone uses the term open. Where the technology sits on this spectrum can have a signifi cant impact on the experi-ence of the integrator and end user, both in the initial implementation of the solu-

    tion and in the technology options in the future. In the best scenario, the connections between solutions use a published stan-

    dard. This often provides the manufacturers the best visibility into the connection between solutions, and ultimately provides greater fl exibility to the end user. One way this can be achieved in the access control realm is by implementing solutions that comply with the Open Supervised Device Protocol (OSDP), a communica-tions specifi cation developed by the Security Industry Association (SIA) to enable devices, such as card readers and control panels, to work together.

    Using a control panel that also supports OSDP, for example, can provide users with the fl exibility they need for their future access control decisions. Customers should ensure the solutions they select support open standards, but it is also im-portant to consider what they are doing to ensure long-term value for the security solution. Just like our laptops and cellphones, technology in the security space is constantly in motion. Manufacturers should be designing solutions to support the latest standards, and to provide a runway for the technologies around the corner.

    GREATER USABILITY AND RELIABILITYAlthough there is often a shift of trends within the industry where manufacturers will fi nd themselves pushed by customers to deliver a certain set of features, two things have remained constant through the years: usability and reliability.

    There are numerous examples that can be found across all product sectors of systems that have either been disregarded, or in some cases, simply turned off because they triggered repeated false alarms or because an organizations security staff found them onerous to manage. Ultimately, vendors that want to deliver an effective solution for their customers must ensure that their product not only pro-vides the features that they need, but is also dependable and user-intuitive.

    CHANGING VERTICAL MARKET DYNAMICS AND REGULATORY COMPLIANCEWhile nearly all vertical markets will have an impact, to some degree, on shaping the access control and overall security industry in the years to come, there are some whose impact will be felt sooner rather than later. For instance, the govern-ment and healthcare markets stand poised to have a substantial effect on product manufacturers due to the necessary requirements these markets have put together around access control.

    The government sector is a prime example of how changing requirements

    1214sec_022_026_Krinitt_v3.indd 22 11/13/14 11:32 AM

  • www.infinias.com | 800.691.8974Engineered by

    Access Control, Meet Video

    Access Control + Video on a Single Platform infinias 100% IP-based access control and video management systems bring all your doors and video to a single platform. Made possible by the all-in-one Intelli-M Access NVR, you can manage and configure both video and access control from one browser-based UI. infinias continues to bring together the features and capabilities that make access control and video management simple and convenient.

    A C t l Vid Si l P

    All-in-one access control plus video management server

    Go to http://sp.hotims.com and enter 8 for product information.

    Untitled-9 1 5/13/14 4:30 PM

  • 2 4 1 2 1 4 | S E C U R I T Y P R O D U C T S

    GROWTH AND TRENDS

    within a specifi c market can have a broader impact on the security industry as a whole. Unlike other industries where minimum security requirements are largely established by the organization itself, security standards in government agencies are regulated by different federal guidelines and mandates that change and evolve with the threat landscape.

    In effort to establish a common identifi cation standard for government em-ployees and contractors, Homeland Security Presidential Directive-12, more com-monly known as HSPD-12, was issued shortly after the 9/11 terror attack by the Bush administration. HSPD-12 subsequently resulted in the creation of Federal Information Processing Standard-201 (FIPS-201), requiring federal employees and contractors to have personal identifi cation verifi cation (PIV) credentials. Ad-ditionally, some corporate entities have also opted to adopt standards similar to PIV due to the enhanced level of security it outlines, which points to how the gov-ernment market has impacted the access control industry.

    However, because many agencies found that the different components they pur-chased to become compliant with the PIV standard didnt work well together, the government recently introduced a new program called Federal Identity, Credential and Access Management (FICAM), which outlines the implementation of an end-to-end access control solution where all devices are interoperable with one another.

    In the healthcare market, there has been a push over the last two decades to improve patient privacy with the implementation of the Health Insurance Por-tability and Accountability Act (HIPAA) and the Health Information Technol-ogy for Economic and Clinical Health (HITECH) Act. While these regulations are primarily designed to safeguard patient data in the age of digital information and cybercrime, the majority of data breaches are not the work of sophisticated hacking networks, but rather negligence on the part of healthcare employees. This means that physical access control measures within hospitals and other healthcare facilities has become critically important as it only takes one door being propped open to reveal a treasure trove of information to identity thieves.

    As a result of the continually shifting threat landscape in these markets, se-curity manufacturers and the products they develop must continue to evolve to meet changing requirements. Oftentimes, it takes collaboration between all parties involvedmanufacturers, integrators and end users to develop comprehensive and effective solutions that not only meet the requirements set forth, but can main-tain and manage the system as technology advances.

    INCREASED CONVERGENCE BETWEEN PHYSICAL AND LOGICAL ACCESS The advent of IP technology has dramatically changed the way security systems are installed, managed and monitored. It has also brought the worlds of IT and security together in ways that some people could have never dreamed. One of these ways is combining technologies to enable access to the physical locations of an organization as well as their computer networks.

    Thats not to say there havent been some challenges in getting the technolo-gies lined up to provide an effective solution for end users; its been a tough sell in many ways. However, the value is certainly there as it simply makes sense for many organizations to have the capability of implementing a converged physical and logical access solution. Like other integrations, the value of the information that is present in a traditional access control system has applicability to the larger organization, and IT is one of those departments.

    Despite the benefi ts that can be realized by bringing these two areas together, many companies have yet to understand how to take full advantage of this con-vergence. Meanwhile, solutions do not always deliver as advertised; therefore, untapped potential still exists. This will likely change, though, as organizations become more tech savvy and hold vendors accountable for what they need to be successful.

    MOBILITY COMES OF AGE The development of NFC technology has been touted by many vendors in the in-dustry as the next great technological leap in access control. On the surface, this excitement is certainly understandable, given the proliferation of smartphones and other mobile devices as well as the increased desire by customers who want the same

    garrett.com Tel: 1.972.494.6151

    Team with GARRETT to create your SAFE ZONE

    Sports fans are passionate about their teams. Garrett Metal Detectors help keep them safe so they can simply relax and enjoy their big game.

    Our American-made products have been an integral part of the security plan at major sports events such as professional football, the Olympic Games, FIFA World Cup venues, the Pan American Games, and even the Little League Baseball World Series. Contact us to fi nd out more about our trusted hand-held scanners and advanced technology walk-through detectors.

    Proudly Made In The USA

    LLaw Enforcemeent Military Sppecial Events Evidence Recovery Loss Preveention Mass Traansit Government Facilities

    Go to sp.hotims.com and enter 18 for product information.

    1214sec_022_026_Krinitt_v3.indd 24 11/13/14 11:32 AM

  • Go to http://sp.hotims.com and enter 22 for product information.

    Untitled-2 1 9/10/14 2:41 PM

  • GROWTH AND TRENDS

    2 6 1 2 1 4 | S E C U R I T Y P R O D U C T S

    level of convenience and usability as commercial security solutions in home consumer devices. However, despite the high hopes for NFC access control, ac-tual implementations have been slow to materialize for several reasons.

    First, manufacturers have to be able to access the Secure Element (SE) of a mobile handset in order to embed a credential. To do so, companies have to enter into partnerships with wire-less carriers. Secondly, a large portion

    of the smartphone market is domi-nated by the Apple iPhone, which until recently did not come equipped with NFC technology. Although theiPhone 6 and iPhone 6 Plus, which made its debut in stores last month, features an

    NFC antenna, it still remains to be seen if the company will grant security man-ufacturers access to an API for access control purposes. With that being said, there is now one less potential hurdle to wider adoption of NFC in the market.

    The announcement by Apple ad-dresses one of the barriers the access control industry has faced with regards to NFC, i.e., loading an identifi er onto the secure element, IHS analyst Blake Kozak wrote in a research note pub-lished by the market research fi rm last month. With the API mentioned by Apple, it is possible that access control manufacturersamong others in the supply chaincould load and com-mand an identifi er directly onto the secure element.

    In the meantime, developers have turned their attention to Bluetooth Low Energy (BLE) technology which has several advantages over NFC, in-cluding the fact that it is available on almost every mobile phone available to-day and because the SE doesnt have to be accessed in order to have the secure credential placed onto it.

    Regardless of which technology wins out, the trend toward increased convenience and mobile access is one that will continue in the market for years to come.

    ADVANCED CAPABILITIES MOVE TO THE EDGEWhile edge capabilities are not new to the industry, there are signs pointing to increased interest by end users in us-ing these capabilities more so than they have in the past. As such, manufactur-ers need to be able to deliver platforms that have the power and fl exibility nec-essary to provide advanced capabilities at the edge.

    When it comes to access control, there are many functions that can be performed at the edge that can enhance value for the end user. For example, be-ing able to display messages to users when they swipe their card at a door, and the addition of personalization and communication options are func-tionalities that vendors will look to improve upon as time goes by.

    Jeremy Krinitt is the general manager of Frontier Security, a divi-sion of Matrix Systems.

    REMOTEREPORTING & CONTROLMONITORING

    Network Communication ModuleLINQ2

    - Facilitates quick and accurate power supply diagnosticsvia LAN/WAN which reduces or eliminates costly service calls

    - Email and/or SNMP trap message notifications forDC output voltage, output current, AC status,

    battery status, unit temperature and more!

    - Local or remote control of power output(s) and(2) integral network controlled form C relays

    More than just power.

    Made in the U.S.A. - altronix.com - Lifetime Warranty

    Download the free Altronix App!

    Monitors and controls two (2)eFlow series power supply/chargers

    Go to sp.hotims.com and enter 10 for product information.

    1214sec_022_026_Krinitt_v3.indd 26 11/13/14 11:32 AM

  • Supported Surveillance

    Access PointsLink remote IP camera installations to a

    network with rugged TRENDnet outdoor-rated access points.

    PointManage network access to

    surveillance systems with TRENDnet Web Smart and Layer 2 switches.

    Smart SwitchesPoE Solutions

    IP Cameras

    Expand a surveillance system with reliable TRENDnet PoE and PoE+ switches, injectors, and splitters.

    E S l ti

    TRENDnet offers a complete networking hardware foundation which supports the efficient expansion of IP based surveillance systems. Look to TRENDnet for all of your IP camera networking hardware needs.

    Outdoor

    Scan me

    888-326-6061 (Option 1)[email protected]

    2014 TRENDnet. TRENDnet and its logos are the registered trademarks of TRENDnet Inc. All rights reserved.

    PoE Wireless

    Go to http://sp.hotims.com and enter 23 for product information.

    Untitled-3 1 8/19/14 12:04 PM

  • ME TOO PRODUCTSBeing wise about the products you present to end usersBy Ian Johnston

    For manufacturers to play within the commodity space, they need to provide the most features, ease-of-use and the best reliability, camera versus camera. If that is accomplished at the going price, you have everything you need to compete in that arena.

    Leadership comes from recognizing the specifi c needs of an end user and innovating better ways to meet those needs affordably. An example of po-tential industry leadership is the practical application of what have become known as edge surveillance products.

    UNDERSTANDING EDGEI think that my defi nition and concept of edge is very differentthan anyone else. I loathe the phrase edge now; its been perverted and abused into being something that is so constrained and limiting that its become useless as a defi nition of what I thinkedge can be.

    The current structure of how IP video is generated, managed and consumed is backwards and behind the curve when viewed in context to other analog, digital transitions. All the security industry has created thus far is a faster, more expensive VCR and a higher resolution CCTV camera. The paradigm of how everything works and knits together still intrinsically follows that same tired, wholly-broken 1970s model. In order to progress and step into the 21st century, this must stop.

    A camera is simply a sensor that collects video, but a modern IP camera has a full 32-bit server with more memory and computing power than the personal com-puter I had when I was studying at a university. Imagine if we said that a mobile phone could only be used for phone calls simply because it was called a phone?

    The same concept and restriction is being pushed onto cameras.Edge, for me, means autonomy. Personally, I prefer the term hive rather than

    edge since it has a better connotation of a system of individual elements that are all working autonomously, yet collectively, to get a job done. Please note that my vision is impossible if Im constrained to just a camera; the right VMS is a canvas on which to paint. My concept may still be a bit too far ahead of the curve in terms of what the security industry can digest, so its best to lay out theedge in steps and as a roadmap of what will come:

    Storage. If a camera needs storage for the video it is collecting, there are many assets it can use. The one that has been pushed by most vendors today is using lo-cal or edge storage in the form of an SD card, or in our case, multiple SD cards. Thats great, especially given the fact that we at ISD/Digital Watchdog (ISD/DW) can put up to a full Terabyte of storage on a camera and thats only one possible destination. Other popular destinations would be a conventional PC server, nosql ORACLE database, NAS box or Amazon EC3 cloud storage. Fundamentally, it doesnt matter what or where it is; what does matter is the size of the data that youre trying to move around and making smart choices about bandwidth man-agement. Data shouldnt be constrained to a single repository or a single function, and all devices need to work together to ensure that everything is taken care of and that no single entity fails or is a point of failure.

    One of the jobs of a camera is to make sure that the video it is generating gets stored. It should be empowered to use any asset that it has access to in order to fulfi ll that role. An edge camera sending video to a standard PC is perfectly legiti-mate, but if that connection fails, it has an obligation to switch to its local reposi-

    GROWTH AND TRENDS

    2 8 1 2 1 4 | S E C U R I T Y P R O D U C T S

    1214sec_028_031_Johnston_v3.indd 28 11/13/14 10:01 AM

  • Go to http://sp.hotims.com and enter 16 for product information.

    Untitled-5 1 11/6/14 5:08 PM

  • GROWTH AND TRENDS

    3 0

    tory. If that fi lls up or breaks, then it should switch to another camera and use its SD card instead. Arguably, if the device is in a critical area, it should be doing this all the time and sending the video to all destinations simultane-ously. It has the responsibility of check-ing in with its hive mates periodically to make sure they arent having problems and are still visible on the network.

    The point is that cameras should no longer be devices that blindly spew out video in a fi re-and-forget mecha-nism. Instead, they should be given the responsibility to ensure that their pay-load is delivered reliably. Think more of an asynchronous, peer-to-peer ar-chitecture where cameras and servers have equal footing and a responsibility to cry if any of them are unhealthy.

    None of that exists today, except in our lab.

    Army-of-one model. All imple-mentations for the moment are in a relatively conservative manner, but that will blossom and fl ourish with better IPVMS platforms. The camera hosts some form of the server on itself and uses local storage to write video. Cur-rent systems have this as an army of one, meaning theres no interaction between the cameras, nor is there any interaction with a conventional server.

    The army-of-one issue is where most consumers have a signifi cant amount of heartburn about deploying edge: What happens if the camera gets stolen? What happens if the SD card breaks? What happens if things stop? How do I know that it failed if the

    camera fails silently? All are good questions and consum-

    ers are smart to think about such things, except for the fact that if a camera is re-placed with a server and it breaks, now multiple cameras arent recording.

    While its limited, this model is use-ful for applications where you dont have the ability to have a relatively high power server running in a remote instal-lation. Construction site monitoring or remote/covert surveillance are great ap-plications. The fact that ISD/DW cam-eras are low power (2 watts) makes it easy to deploy cameras using battery/solar power. These days, a 64GB card can provide almost a week of storage, if recorded on motion.

    A properly designed edge system is more scalable, fault-tolerant and has the ability to adapt to other requirements. It doesnt have to be more expensive than

    a conventional head only system since most of the concepts Im talking about are largely software based, using a differ-ent paradigm of how the security system gets deployed.

    Applications. This is where edge cameras have an immediate advantage

    over their acrophobic brethren. It is summed up with one word: scalability.

    Analytics have traditionally been run on conventional PC servers and have had a tendency to over promise and under deliver. Smart folks have long fi gured out how to use some clever

    math to determine what the camera is looking at. Theyre usually prototyp-ing with a single camera running on a big iron PC with tons of RAM. Those same people demo it to their sales team who immediately say, Wow! I can sell that! Then, they get venture capital

    Go to sp.hotims.com and enter 26 for product information.

    1214sec_028_031_Johnston_v3.indd 30 11/13/14 10:01 AM

  • 3 1

    funds to sell it to the world. Everyones happy; they do demos to potential cus-tomers and install test deployments. All is good. The challenge comes when their customer wants to use more than a few cameras on the same PC. Here is the awkward conversation about hav-

    ing to buy more big iron servers; its just not scalable.

    As a good friend of mine, who lead the engineering team of a leading ana-lytics company, said, You cant go out of business fast enough being an analytics company. Most have become

    VMS companies with optional analyt-ics to keep alive the dream of what they started. The critical fl aw, with the pos-sible exception of a select few compa-nies: Analytics companies all wanted to run on generic cameras, hoping that the various camera companies would help

    sell their solution. It never happens. Bad things happen.

    CHANGE THE RULESThe consumer electronics industry has led to some stunning innovations and advancements in mobile computing. The fact that you can play Angry Birds on your phone is a prime example. As for the security industry, as a whole, theyre focusing on making the camera equivalent of a No. 2 pencil, so theyre unwilling to put any meaningful invest-ment of technology into the cameras. This means they cant do anything in-telligent at the edge and no one is able to escape the black hole that is com-moditization and consolidation.

    With modern CPUs that are tar-geted for mobile devices, it is possible to run meaningful analytics at the edge. Right now, business analytics and intel-ligence for marketing applications are all the rage.

    We announced at the 2014 ISC West show a partnership with Prism Skylabs, and at the ASIS 2014 show, deployment with their analytic fully running inside our next generation cameras without any compromises. Why is this impor-tant? Why do I feel this is critical to their success? Scalability and the elimi-nation of servers.

    With the kind of deployments I have described, every camera has the pro-cessing power it needs to be successful. Whether deploying three or 3,000 cam-eras, it doesnt matter. Its scalable, de-terministic and eliminates the need for expensive servers. It is a win for every-one, even IT departments that tend to be suspicious of any third-party servers installed on their networks. They are correct to be nervous, given the threat of malware that inevitably gets upload-ed, not to mention inappropriate activ-ity that often coincides with a PC that has a screen, keyboard and network connection.

    The camera is an appliance. It has everything it needs to automatically confi gure and deploy itself when at-tached to the network by integrators. That user experience can be simplifi ed to a lick-and-stick, analog-like deploy-ment. It is simplicity that just works.

    Ian Johnston is the CTO at Digital Watchdog.

    Go to sp.hotims.com and enter 26 for product information.

    1214sec_028_031_Johnston_v3.indd 31 11/13/14 10:01 AM

  • 3 2 1 2 1 4 | S E C U R I T Y P R O D U C T

    1214 NEW PRODUCT OF THE YEAR WINNERSCompiled by Lindsay Page, Senior Editor

    ACCESS CONTROL

    Axis CommunicationsAXIS A1001 Network Door ControllerThe AXIS A1001 Network Door Controller is a non-proprietary, open IP-based access cont