You are at : Search > Articles Search Results

Articles Search Results

329 Articles and 12 related Products found for Biometrics

Children's Clinics Deploys Secures Electronic Health Records with Fingerprint Biometrics

Children's Clinics Deploys Secures Electronic Health Records with Fingerprint Biometrics

Editor / Provider: DigitalPerson | Updated: 8/25/2011 | Article type: Commercial Markets

DigitalPerson, a global provider of authentication and endpoint protection solutions, announced Children's Clinics for Rehabilitative Services (Children's Clinics) has deployed DigitalPersona Pro data protection and access security software and U.are.U Fingerprint Readers to enhance the rollout of its new electronic health records (EHR) system. Using fingerprint biometrics, Children's Clinics has eliminated the need for employees and contract healthcare providers to remember passwords to access applications and sensitive patient information. This new system improves workflow efficiency, increases patient data security and significantly reduces IT helpdesk requests for lost or forgotten passwords.

With more than 25 specialty clinics, primary care and therapy services, Children's Clinics offers Southern Arizona's families a wide range of healthcare services to meet the health care needs of their children. The organization was transitioning to NextGen Ambulatory EHR from years of utilizing paper charts. Children's Clinics was challenged with managing login credentials and needed a solution to help streamline the login process to improve workflow. More than 40 percent of the clinic's staff are part-time contract providers who only work in the clinic a couple of times a month. Because contactors only use the systems when they are at the clinic, passwords could easily be forgotten. Time and resources would be wasted recovering and reissuing passwords, causing frustration for both providers and patients.

"As we rolled out our new EHR system, it was important for us to make the transition easy for our providers who had to learn the new system. Our providers were already frustrated with having to learn another EHR system so we wanted the login process to be as fast and as simple as possible," said William Mayo, information systems supervisor, Children's Clinics. "Using DigitalPersona Pro and U.are.U Fingerprint Readers allows our providers to log into our EHR system without the hassle of remembering their password. User acceptance has been positive because employees can quickly and easily access their applications from any exam room PC with just their finger."

"The finger print readers have been the best part of the whole EHR roll out. I love it," said Dr. Sydney Rice, Medical Director, Children's Clinics. "Implementation went smoothly and our providers quickly became fans. It is wonderful to avoid yet another username and password."

By integrating DigitalPersona Pro and U.are.U Fingerprint Readers with the rollout of its EHR system, Children's Clinics was able to significantly speed up the login process required to access the applications throughout the organization. DigitalPersona Pro's kiosk feature has helped to streamline workflow processes by eliminating the need to constantly re-enter strong passwords required for exam room PCs. Since many employees are involved in a patients visit, employees can log out of the EHR in the exam room PC and the next employee can continue the exam where the previous employee left off. The solution helps address compliance with industry regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act, by strengthening authentication in ways that doctors, nurses and clinical staff find easy to use. Children's Clinics staff can instantly access a broad set of applications OWA email, Exchange email, Ramsoft PACS, other community EHR systems, and information, including health records, radiology images and email.

Shedding Light on the Adriatic Region

Shedding Light on the Adriatic Region

Editor / Provider: a&s ADRIA | Updated: 8/23/2011 | Article type: Hot Topics

Is the winter over for security in Southeast Europe? a&s Adria explores.

The 2008/2009 financial and economic crisis took its toll on many developed world economies. In our last year's report, “hazy” was predicted for the Adriatic region; Vladimir Grigorov from the Vienna Institute for International Economic Studies highlighted that countries in the region were headed to a severe recession, due to their poor export base, insufficient loans and dried up foreign investment. Fitch Ratings also warned against a series of trade and financial shocks that would hit emerging economies in Central and Eastern Europe.

But how are things shaping up this year in the security business in the region?

Miroslav Krleza, GM of Uniplus: Business risk, against potential earnings, has increased significantly due to very high insolvency. In years 2009 and 2010, we were relatively successful as we realized several projects in cooperation with our partners. This year so far has been in a “safe mode,” and we are reevaluating market research and potential. We believe that, in the next few years, intense technological development and innovation in video surveillance systems will continue. Therefore, we are expecting a dynamic recovery with exciting job opportunities. Growth can be seen in increased implementations of IT/IP-based equipment and realization of value-adds through integrating with business systems.

Kresimir Paic, Director of Eccos Engineering: Most research reports yield erroneous results, so we do not base our business decisions on their predictions. To stay in this business, cost optimizations and savings, investment in knowledge expansion, and export-oriented organizational thinking are required. I believe that the highest growth will come from video surveillance and access control equipment. The previous downward slope is stopped for now due to increased activities in neighboring foreign markets, but I would not dare to make a long-term prognosis.

Robert Pazitka, CEO of Pro Alarm: The recession caused by the global crisis was only the trigger for many internal problems of former Yugoslavia, which previously were not fully expressed or were pushed aside. The art of surviving means quick adaptations to different ways of doing business and continuous adjustments to business dynamics on a daily basis. Measures include maximum reduction and continuous monitoring of costs, company reorganization for greater efficiency and better utilization of existing resources. The positive shift observed in the current year, through a number of inquiries and new bids, is hopefully a sign that we had reached the bottom. Our favorite is video surveillance, whose growth has lasted for several years and still has not seen “the end.” We expect access control systems to increase in the total volume, alongside loss prevention, intelligent video, and fleet management and protection systems.

Mladen Ozimec, Director of Salon Ozimec: The 104-percent increase in our turnover from 2009 to 2010 speaks volume about the recovery. New legislative changes that support our operations in the E.U. are one of the key growth factors. Sectors with biggest growth include transportation, banknote-processing facilities and cash in transit.

Boris Popovic, CEO of Alarm Automatika: The market is definitely more active than last year — more inquiries, contacts, presentations and meetings. It is recognizable that users can no longer wait to solve their security and operational problems. I attach great importance to research results, especially those of independent institutions. These results are useful in selecting the right product characteristics that we offer or develop. We have developed in some new markets, opened new offices in Banja Luka, Bosnia and Herzegovina, hired new people and reinforced software development efforts. We expect the biggest growth in the applications of IP-based products and wireless technologies, which partially simplify and make cheaper implementations of security measures in different types of buildings. It is important to select equipment based on open platforms, which are becoming more available every day. Aside from integration of security systems, building management software connected to business operations such as MIS and ERP is equally important and promising.

Azemina Harkcom, Director of DSC BiH: What happened was exactly what we expected to happen. We believe that with a little more effort and work, everything can be overcome, especially when it comes to doing business in safety and security, which should not be challenged for any reason. A lot of good, positive changes are expected to come in the second half of this year. A key business action should be driving further investment in and support to customers in all segments, including the construction sector which has started to move.

Mirsad ?ati?, President of Securitas: During the recession, we refocused our energy on clients who were not much affected and catered to their needs exclusively.

So, the key element in success would be striking a balance between extremes and planning your operations wisely and accordingly. Maintaining strategic business relationships with the right banks and active clients also means stability. It is also vital to keep improving product and service quality. Always think, always do something new, always innovate and always invest! [NextPage]

Djordje Vucinic, President of Securitas: We, as part of a group that operates in 46 countries with more than 280,000 employees, were able to leverage the experiences and knowledge of our colleagues, and provide the right solutions. While we belong to the service segment that was hit very hard and key challenges such as unemployment and slow new investments remain, positive developments are luckily taking place all over the world. We were also mindful of expenses optimization, organizational efficiency and continuous innovations. The conditions for doing business this year have not yet improved, but it is important to note that no significant negative trends are present. March showed a slight upswing, and we hope it will continue. It is also quite obvious that more and more clients are turning to quality products and services, and that increased use of physical security measures and guarding services will come over time.

Rok Bajec, Director of Mobicom: The number of companies that failed is growing; unemployment is at record levels; money is almost nonexistent. The construction sector is sinking, which also drags out some other problems. It is not a time for major investments and building facilities, and therefore we should meet our goals in some smaller projects. The biggest issue is still payment, which means you will never know when you will be paid for equipment and/or services provided to your customers. Before the recession, tenders were usually competed on by seven to nine companies; now, the average number of participants has increased to 18. People no longer trust banks and do not believe in incentives from the government. If changes do not occur, the situation will only be even worse and confidence not regained. Statistics are not something on which I would base my business decisions. Knowledge of the market and situations related to customers are more helpful in business planning than world-leading research companies. We, however, expect growth in intrusion detection and small video surveillance systems.

Igor Sterle, Director of Linde MPA: In Western Europe, there has been a visible, positive trend due to government stimuli. In contrast, Italy, the Czech Republic, Slovenia and some other parts of the Adriatic region, government investments in their own economies are, in my opinion, still not enough. These countries have already entered the third year of the recession, and the end is not in sight. If the only countermeasure is cost savings in all areas, then the results will just be that — zilch. In our business, which is closely related to the field of biometrics, we do not feel the recession. This is a very specific technology with a sharp increase; we have seen a consistent annual growth between 40 to 50 percent for the last five years, especially in banking and payment transactions.

America Learns from School Of Hard Knocks

America Learns from School Of Hard Knocks

Editor / Provider: a&s International | Updated: 8/16/2011 | Article type: Hot Topics

The American dream invites everyone to its shores to reinvent themselves. Anyone can make it in this nation of immigrants, as long as they work hard to earn their keep.

However, dreams of success became an obsession for some. Well-documented instances of greed defrauded countless victims, such as Enron's auditors covering up gross corruption. As Wall Street's fat cats cashed in on the American dream, the recession sent the global economy into freefall.

The US spirit of optimism is well-meaning, but not always able to accept failure. As the market boomed, there was no tolerance for “weak” performance, until lending spun recklessly out of control.

In flush times, America's greenbacks are welcomed — its market demands a never-ending supply of resources and finished goods. However, befriending the U.S. requires playing by its rules. The image of a self-seeking American cop bullying uncooperative nations into submission with trade sanctions and embargos illustrates how unpopular its foreign policy can be.

While foreign policy may have stoked the ire of America's enemies, it does not justify the deliberate attacks in 2001. The violent strikes on US soil increased security spending significantly, as the country sought to defend itself against further threats. In a country where anything is possible, America has to face the reality of an uncertain world that does not always go her way.

The can-do spirit of America encourages entrepreneurship. Top institutions attract the brightest minds from all over the world, with a clear immigration process to retain the crème de la crème. “The U.S. is unique for containing the high end for innovative R&D and utilizing Asian production capability,” said Bengt Christensson, Senior Marketing Director for Ambarella.

A commitment to innovation is what makes a company unique. “Manufacturing has the same costs, so the differentiator will be innovation, quality, and support and services,” said Fredrik Nilsson, GM for the Americas, Axis Communications. “That takes a lot of R&D and service.”

The U.S. is home to the most cutting-edge technologies, such as biometrics and video analytics. However, domestic production is not cost-effective, resulting in global partnerships. Even local players have their eye on overseas targets. “What's unique about US companies is they look more toward the global marketplace,” said Lance Holloway, Director of Technology Strategy, Stanley Convergent Security Solutions. “Before, they were content to be regional players, but a global outlook is now an understood expectation.”

Biometrics is an area where the U.S. has advantages, from iris recognition to multispectral fingerprint imaging. The latest multispectral techniques used red, green and blue lights to capture images 2-millimeter deep of capillaries that match the fingerprint, even through wet latex gloves, said Bill Spence, VP of Transaction Systems, Lumidigm.

Intelligent video is another strength. “Analytics were discovered in the last 10 years, which ushered its reach into the mainstream,” Christensson said.

Analytics have moved from military applications to being baked into mass-produced components. The latest Texas Instruments network camera and DVR reference designs both include intelligent features, placing smarts directly at the edge.

Security went from being “recession-proof” to “cautiously optimistic” in the wake of the financial downturn. “The U.S. is rebounding quicker than Europe, except for intrusion,” said Paul Everett, Research Director for Access Control, Fire and Security at IMS Research. “The U.S. was impacted before Europe.”

As the US economy suffered the Lehman Brothers collapse first in 2008, it has had more time to recover. “The recession eradicated a lot of companies,” said Roger Decker, Director Solutions and Marketing, Siqura Surveillance Solutions (a TKH Group company). “Now, it's picking up.” Optelecom-NKF was acquired by TKH Group in November 2010, going to market as TKH in the U.S. and Siqura in the rest of the world. Its business is “going through the roof” in the U.S. this year, compared to 2010.

Some players managed to beat the market, particularly smaller and more nimble IP companies. “The recession did affect our business, and some customers were considering purchases more carefully,” said John Szczygiel, Executive VP of Business Development, Brivo Systems. “Brivo still grew 40 percent in 2010, which was faster than the industry.” Its cloud-based access control economic model allowed users to pay for only the services they needed instead of purchasing equipment upfront, making it an attractive option in tough times. Larger companies were able to fall back on more diverse portfolios. “We changed our emphasis 24 months ago to focus on the government sector,” said Matt Barnette, VP of Sales and Marketing, AMAG Technology. “We had an early move into that, so it backfilled any loss of revenue from the commercial sector.”


Federal mandates are essential in the U.S., the world's third largest country by population and land mass. Comprising 50 states, central directives help keep US systems consistent, if not always funded. Smart-card shipments in the Americas will increase due to government initiatives to introduce smart cards in various industrial segments, said RNCOS in a report.

Streng thening homeland security encompasses significant legislation, from Homeland Security Presidential Directive 12 (HSPD-12), Federal Information Processing Standard 201 (FIPS-201) to the First Responder Authentication Credential (FRAC). Both FIPS-201 and FRAC address personalidentity verification (PIV) of federal employees and contractors authorized to access government buildings and other sensitive locations in the event of a crisis. The American market is highly standards-driven, making it a business challenge to grow, said Denis Hebert, President and CEO of HID Global (an Assa Abloy company).

Many projects strive to protect critical data. “Under HSPD-12, the government classified things as critical infrastructure and made specific recommendations,” Szczygiel said. “These include places such as hospitals, schools and food supplies.”

Compliance with federal mandates is not optional. Mandates require certification for equipment, such as IP controllers, before they can be specified for government projects, said Karen Evans, President and CEO of Sielox.

The exacting nature of the US industry is a welcome challenge to some newcomers. Gallagher Group worked on access control management for the Australian Intelligence Services — crucial experience as the company goes through US certification. “The U.S. is a market of specialization,” said William Gallagher, CEO of Gallagher Group. “It is the most sophisticated and demanding market.”

Government edicts drive agencies. One example i s a memo issued on Feb. 3 by the Office of Management and Budget, telling federal agencies to comply with HSPD-12 requirements by December 2012 or risk losing their funding. “As of December 2010, agencies reported that approximately 5 of 5.7 million federal employees and contractors have completed background investigations, and 4.5 million have PIV credentials,” wrote Gregory Schaffer, Assistant Secretary for Cyber Security and Communications, Department of Homeland Security, in the memo.

Cloud services are generating interest, with federal groups looking a t how to remotely host and manage systems. “The government has a big initiative,” Barnette said. “Whether deployed or not, some IT security issues are resolved through standard committees.”

The cloud strategy emphasizes service, or paying for what you consume. Using native IP infrastructure saves on hardware costs through a hosted service, Szczygiel said. It also offers a unified platform, similar to Google for search. To conduct access control, hosted services provide a portal to anyone in the world.

Video surveillance is floating into the cloud as well, with Next Level Security Systems and Axis Communications launching hosted services or managed video as a service (MVaaS) in the U.S. Hosted solutions allow users to view multiple sites through one interface, with little or no upfront capital investment — an advantage over traditional surveillance with closed video systems that are not interlinked. MVaaS leverages video as a productivity tool, translating video-based data into actionable intelligence.

Vertical-specific mandates such as the chemical facility anti-terrorism standards (CFATS) are among the alphabet soup of federal legislation. “The US domestic market has more emerging regulations,” said John Romanowich, President and CEO of SightLogix, who chairs the security committee for CFATS. “Before, the government would push a mandate, and the petroleum companies would say they had no money that year. Now, the mandates will be authorized for five to seven years, instead of annual mandates.”

Hollywood attracts aspiring stars; New York draws fashion hopefuls; and Silicon Valley pulls in the brashest high-tech entrepreneurs. Finding a regional hub for physical security is harder to locate. For security, America is more of a think tank for R&D rather than actual manufacturing. There is no need to cluster production facilities in the same physical space, unlike film studios or couture ateliers.

Security is also more fragmented, making location less of an issue. “Companies in North America add more value on R&D for the high end, and then outsources the mainstream volume products to Asia,” Christensson said.

America's vastness makes it difficult to generalize about the whole nation, as each state has its unique culture and business approach. “If you look at access control, the East Coast is very security-conscious for 9/11 areas, like Washington, D.C. and New York City,” Everett said. “When you go to the West Coast, it's more laid back, with a different thought process compared to the East Coast.”

The US security industry has a wealth of resources. It attracts top talent and nurtures entrepreneurs willing to think big. However, its success has earned it some enemies, requiring legislation and funding to defend against threats. America's domestic market demands and key product usage trends are explored in the US Market Update.

Colorado Regis University Utilizes Brivo Access Technology for Classroom and Equipment Security

Colorado Regis University Utilizes Brivo Access Technology for Classroom and Equipment Security

Editor / Provider: Brivo systems | Updated: 8/15/2011 | Article type: Education

Brivo Systems, leader in Software as a Service applications for security management, announced that Regis University, Denver, Colorado, has deployed Brivo's ACS WebService for managing security at its new CyberSecurity Education Center at the University's Denver Technology Center campus. The University selected Security Install Solutions (SIS). located in Denver, Colorado, as the integrator for this project.

When the University began building its new CyberSecurity Education Center in the fall of 2010, staff knew the facilities would be much more than just a classroom and that there would be a lot of expensive equipment onsite. Also as time went on, more and more visitors would be utilizing the facilities, in addition to the adult students. “Clearly, we had to have enhanced control over the doors at the center and who was coming into and out of the classrooms and meeting rooms,” explained Dan Likarish, Director of the Center on Information Assurance Studies at Regis University.

The University's Facilities Manager recommended that Dan and his colleagues speak with Security Install Solutions. Rueben Orr with SIS provided them with a demonstration of the Brivo access control technology. “It was at this time,” Likarish recalled, “that I realized not only could we use the Brivo system to improve our building security but it represented a teaching opportunity, too.”

Regis' campus at the Denver Technology Center is a public access facility, located adjacent to a major highway and accessible by light rail. Easy access also means that anyone can be walking around the campus. In addition, the Center has made a substantial investment in the equipment they provide in their classrooms and labs. The Center caters to an adult student body so classes are held at night, which compounds security challenges. “With Brivo, we have what I call constant vigilance monitoring and that reduces our worry factor,” said Likarish. “Add to this that our students get the practical experience of working with this system in a higher security environment and that's a positive experience all around.” All students earning their master's degree in information assurance do a walk-through of the University's security systems and that's when they are introduced to Brivo ACS WebService. “Utilizing the Brivo system, we demonstrate the one, two, and three factor combinations of identification—card, biometrics or fingerprint reader, and PIN.”

Likarish continued, “Physical security is part of our curriculum, so we used our Brivo system to turn it into a lab exercise. We explore not only the physical devices, but also what happens in the event of a power failure, what is the door device to webserver connection, why use PoE, what is the support and maintenance model, and many other aspects.”

Another purpose for the Center is to provide education for first responders at the tribal, local, state, and federal levels (the FBI, FEMA, and Interior are future, prospective customers). So, the University has many different groups coming through and recently was preparing to receive 70 new visitors in just a few days. “The Brivo system gives us the flexibility to control our rooms for our many different needs, and those needs are only going to expand as we receive more and more visitors, hold trainings and cyber competitions, and so on. Brivo's ease of use in managing these situations really sold us on the system,” said Likarish.

Likarish and his staff manage all the students' access to the facilities, as well as other staff and their many visitors. They utilize the system's alert features to stay on top of events like loss of power, forced door entry, unidentified or unscheduled card usage, and others. “The system is reliable, scalable, redundant, and it's easy to use.”

Has the Brivo system met Regis University's overall needs? “It has met and exceeded our expectations,” reported Likarish. Once the system was in and we established a baseline, we've found it even better than we thought it would be.”

Newcastle Construction Site Leverages ievo Biometric Readers for Payroll and Access Control

Newcastle Construction Site Leverages ievo Biometric Readers for Payroll and Access Control

Editor / Provider: Ievo | Updated: 8/9/2011 | Article type: Commercial Markets

Based on a site in the heart of Newcastle Upon Tyne directly opposite ST James Park Football Stadium and the Newcastle University Business Center is a modern district being constructed by George Downing Construction. The construction site is part of a number of projects within the city center including the new bioscience buildings.

Downing operates across three successful divisions mixed-use development, property management and construction. This unique approach arms them with thee breath of experience and skill to maximize vale, quality and use of space where other would fall short. As a mixed-use developer they are operational across four northern cities-Liverpool, Newcastle, Leeds and Manchester. George Downing Construction is the group's in-house construction arm. The company handles the main contracting role of all construction requirements and employs 45 highly skilled individuals. This expertise minimizes risk and ensures projects are delivered on time and in budget. This holistic approach is the key to the sustainability. By refusing to be one dimensional they maintain a thriving investment portfolio and are continuing to grow as a major force in the property industry.

In August 2010 GDC decided to specify a new biometric turnstile access control system to replace an existing product which proved not fit for purpose. They were using two fingerprint readers, however because the technology utilized dated optical readers they would not stand up to the harsh environment of a construction workers fingerprints. The readers would also create queue problems because workers had to enter a six-digit code prior to scanning their fingerprint. Because the site had more than 300 employees, this was causing major problems especially for those forgetting their PIN codes.

It is estimated that the biometric system will have up to 800 people registered. The system will be on the site for a total of 86 weeks and then moved to a new GDC site. This site secretary, Jacqueline Pearson, controls all of the security system from one PC on site. She believed the main advantage of ievo and Net2 is how easy it is to use.

The setup of the biometric system on site is a double turnstile positioned in a cabin at the front of the site. An ievo reader is placed on both sides of turnstile. Construction staff then approach the turnstile, scan their finger on the reader and proceed through the turnstile if access has been granted .This event is recorded in real time on the Net2 software and can be used later for administration.

Pearson said, ”We wanted a biometric system because we new traditional card system are corruptible and heart at GDC we take health and safety very seriously. So knowing who is on site all of the time can be very advantageous not only for health and safety purposes but also from a time and attendance perspective. I can now run simple 100-percent accurate reports telling which employees or contractors don't get over paid and any disputes are quickly resolved because the biometric evidence is irrefutable. We also wanted to get rid of using a PIN code and just want workers to be able to scan and enter on site, this would drastically cut down on queues when workers come on and off site. With ievo there is no need to enter a PIN code, workers can simply scan their finger and this greatly reduces the time it takes to get through the turnstile."

"We also use the anti pass back facility on the software which means the system will not let personnel scan off site unless they have scanned on and vice versa," Pearson said. "This is critical for health and safety because we know exactly who is on site. When we run a fire drill we can compare the software report to actual people on site. We have ran a number of these reports and they have been 100 percent accurate."

Security Consultant of Phoenix Eye, Michael Bellis said, ”Having seen ievo readers in harsh environments I knew this was the right product for GDC. They had already used biometrics and believed in the concept but were disappointed at previous technology results. When we demonstrated the capabilities of ievo readers and the reporting information they could get from the use of the complete system the quickly gave us the go ahead to install. Cost was also a significant factor for the customer because they wanted a system that could be relied upon for accurate information without costing the earth. Despite the ievo technology being far superior to that which they had in place the cost was also significantly less."

Security Management Taking Off

Security Management Taking Off

Editor / Provider: UTC Fire & Security, CEM Systems ,System Development Integration and Bosch Security Systems | Updated: 7/6/2011 | Article type: Infrastructure

Airport projects — both new and expansions/upgrades — are taking place all over the globe. These projects aim at putting integration-friendly systems in place for total security and safety management at major air travel hubs.

Zurich Airport Monitored by UTC Fire & Security
Unique (airport operator) operates Switzerland's renowned traffic hub, the Zurich Airport, and is responsible for the airport's daily management. The airport houses around 180 different companies. Unique employs approximately 1,400 people, and together with more than 260 airport partners, the combined total roughly equals 21,000 employees.

The Zurich Airport needed to upgrade its aging video surveillance system, for which obtaining replacement parts was often very difficult. Furthermore, the system could not be expanded, but scalability was demanded along with the expansion of the airport.

UTC Fire & Security offered a combined solution that integrates the existing 330 analog cameras by using 46 digital encoders. The encoders digitalize the camera data so that it can be transferred to the monitoring stations. Each monitoring station is equipped with 40 TB of local storage space, storing more than 400 million images, and events can be saved to the central storage (800 GB) when and if necessary. To avoid the costs associated with establishing a new network, the existing IP network was used to transfer all data.

An additional advantage of the system is that it easily allows for future expansions. With UTC Fire & Security's system installed, Unique is able to monitor all events on its premises and, thus offers a safe environment to those passing through the Zurich Airport.

CEM Systems Refines Access to HKIA
Hong King International Airport (HKIA) has about 900 aircraft movements, serves more than 160 worldwide destinations daily, and had more than 50 million passengers in 2010 pass through the airport, making it one of the busiest international passenger airports.

In 2010, HKIA awarded CEM Systems (a Tyco International Company) a US$2-million security management system upgrade contract. The HKIA upgrade was significant as more than 1,000 serial readers were seamlessly upgraded from Wiegand technology to PicoPass smart-card technology using existing IP connectivity at the airport for simplified installation.

The contract also included a further expansion of fingerprint card readers to all air bridges. The progressive move to biometric card readers was achieved to increase the overall efficiency of the airport.

The fingerprint readers increase HKIA's security by providing three levels of identity checks, including ID authentication, PIN check and fingerprint verification. Each reader has a large internal database which holds card and encrypted biometric templates at the door. This ensures zero system downtime at air bridges. The reader also features an LCD to show personnel meaningful user messages and has many airport-specific door modes such as “Passenger Mode” and “Lobby Mode” for extended doors-open times at air bridges. With the readers in place, only authorized and trained personnel can use the air bridges.

HKIA also uses portable readers for mobile security. The reader allows security personnel to make roaming checks throughout the airport and can also be used at temporary entrances where there is no mains power. This ensures the highest level of security at all times

SDI Upgrades a Midwest Airport's Access Control
System Development Integration (SDI) was contracted by a US international airport in the Midwest to upgrade all hardware and infrastructure to support the biometrics component of its access control system (ACS). The ACS controls the passage of staff (not passengers) into secure and sterile areas of the airport. In order for the ACS to be fully secure, the system must address three checks for an individual's identity: something s/ he has (ID badge), something s/he knows (PIN) and something s/he is (fingerprints).

To minimize service disruption, three subprojects took place. The first challenge was to issue new smart-card ID badges containing unique biometric data to more than 45,000 active holders in a period of less than three months. During this process, every active badge holder was required to submit a new badge application, have his/her badge photo updated, and enroll in the system with two fingerprints that were subsequently stored on an encrypted smart card as a biometric template.

The second subproject targeted the installation and deployment of biometric card readers at each of the employee checkpoints in the airport in order to enhance employee screening. Biometric verification would now be required to allow employee access through each checkpoint. A new fiberoptic network and new control panels were installed throughout the airport as the badge enrolment process took place.

The third subproject focused on the biometric validation of badge holders entering the airfield at a busy drive-in post. The post witnesses airfield access to between 6,000 and 7,000 vehicles per day. This high-traffic entrance screens not only airline employees, but contractors and other service personnel. With the implementation of wireless handheld biometric card readers, all access is now granted through validation of biometric information. A customized gate software application provides the security officer with instant visual verification that all people entering with vehicles are valid badge holders.

Bosch Secures Berlin International
Bosch Security Systems was selected to install security and safety systems at the new Berlin Brandenburg International (BBI) airport. The scope of the order includes the planning and installation for the fire alarm system, electroacoustic emergencywarning system, emergency exit door controllers, intrusion detection system, video surveillance, access control and building functions.

BBI represents the most important infrastructure project in Germany's capital region and is Europe's largest airport construction site to date. It is built to better connect Berlin and the entire region with major destinations in Europe and throughout the world. Further, it will be an important contributor to the regional economy; BBI is expected to create up to 40,000 new jobs.

Optimal protection against fire hazards with around 19,000 automatic and manual fire alarms and a whole host of fire control systems will be installed. They will be connected to a total of nine networked UGM universal security systems. The networked public address (PA) and evacuation system with around 11,500 speakers is planned for passenger information and evacuation in the event of a hazardous situation. The PA and evacuation system will also be used for voice announcements for passenger information and for the gate-paging stations.

In addition, an intrusion detection system will be integrated with the fire, PA and evacuation systems. The information for surveillance is recorded using around 1,200 emergency call couplers. The video surveillance system consists of 300 network dome cameras, 260 HD video cameras as well as 900 video cameras of different types. It will be managed by the Bosch video management system. Bosch will also install more than 600 kilometers of copper cable for the fire alarm and intrusion detection systems as well as the electroacoustics.

The new BBI airport will most likely go into operation in June 2012. With 280,000 square meters of terminal and pier space, a baggage sorting hall of 20,000 square meters, as well as a 9,500-meter conveyor line, it will be one of the largest airports in the world.

Moving About in Airports with Biometric Scanning: The World at Your Fingertips

Moving About in Airports with Biometric Scanning: The World at Your Fingertips

Editor / Provider: Camille Shieh | Updated: 7/6/2011 | Article type: Infrastructure

Advanced technologies such as biometrics-credentialing kiosks are not just seen in movies;they are gradually appearing in high-risk settings such as at airport customs. Not only do biometrics help screen travelers, they are also exceptional management tools in safeguarding restricted areas and keeping tabs on attendance and payroll records.

Biometrics have not been popular in airport settings until recent years, as a result of the technical barriers that hindered their performance in real-life situations. Often, a biometric reader that performed perfectly in a laboratory test is less impressive in real life, as various environmental and hygienic factors obstruct accurate scans.

In the case of fingerprint scanning, most optical sensors are configured to look for the presence or absence of total internal reflectance (TIR), which is the phenomenon whereby the interface between glass and air acts as a mirror at certain angles, said Phil Scarfo, Senior VP of Worldwide Sales and Marketing, Lumidigm. “The contact between the skin and the platen defeats the TIR, allowing those points of contact between the finger and the sensor to be imaged. Thus, those points of contact must be complete and visible to enable the conventional sensor to collect a fingerprint image. Optical and electronic sensors simply cannot do this time after time. All too often, 3 to 20 percent of the time, the reader is unable to detect the fingerprint.”

In recent years, multispectral imaging technology has solved the fingerprint-capturing problems that conventional imaging systems encounter in less-than-ideal conditions. “This solution is based on using multiple spectra of light and advanced polarization techniques to extract unique fingerprint characteristics from both the surface and subsurface of the skin,” Scarfo said.

As airlines and airports work to balance traveler convenience with the need for security, they will increasingly integrate advanced biometricsbased identity authentication technologies into the growing range of self-service processes within air travel, such as passenger and baggage check-in kiosks, said Scott Basham, Location, Perimeter and Surveillance Security Asia-Pacific Program Lead, Unisys. “This is because self-service processes have extended deeper into the air travel cycle — from online flight reservations to today's passenger and luggage check-in kiosks at domestic airports just prior to boarding a flight.”

Staff and Crew Management
In “Recommended Security Guidelines for Airport Planning, Design and Construction” revised by the US Transportation Security Administration in May, while the use of biometrics is not a federal requirement for US airports, the higher degree of security is recommended for strategically significant facilities or high-risk portals.

Commonly used access control features that tie in with time anddual-authentication process, which includes a smart card with a photo ID and biometrics, said Scott Mahnken, VP of Marketing, Bio-Key International. “Depending on the life cycle of the access control system installed, incorporating time and attendance into access control is a logical step in the upgrading/ replacement process,” said Mark Moscinski, VP of Safety and Security, System Development Integration.

Restricting access for aviation staff can be easily configured by applying biometrics credentialing to sensitive entry points. For unsupervised access to high risk areas, biometrics clearly offer a more secure solution, Basham said. “But care must be taken to ensure that the biometrics cannot be circumvented — either through biometric spoofing or tailgating, where multiple people enter at the same time without verifying their separate identities.”

“At Yeager Airport in West Virginia, hand geometry readers have been used since 2001, restricting access to the control tower located in the airport terminal and also to the HVAC system and other sensitive equipment,” said , VP of International Sales, Ingersoll Rand Security Technologies. “The control tower doors are opened about every five minutes around the clock. The hand readers are all networked to the airport's central security system.”

Staff's time-and-attendance records can be simplified as well. “Biometrics are often at the front end for time-andattendance systems in all types of industries, including transportation venues,” Diedam said. “Contrary to using badges, sign-ins or other ways of tracking employees, a biometric reader assures that no employee can punch in for another, eliminating time fraud and reducing payroll costs. This is why so many organizations now employ biometrics; for instance, at the Miami International Airport, the hand punch terminals take time and attendance even for janitorial services.”

Eliminating “buddy punching” is only part of the reason that many want to upgrade, Scarfo observed. “Biometric time-and-attendance systems also prove to be more cost-effective in the long run. Within three to five years, biometric solutions become break-even with plastic cards because of the associated costs with cartridge and printer replacements, as well as the support and management of the system.”

“We've received many requests for facial-recognition technology for airport employees,” said Aluisio Figueiredo, COO of Intelligent Security Systems. “The main factor is that it is not as intrusive as iris and fingerprint scanning. However, the drawback is that equipment setup must be in accordance with the environment; cameras must be placed in specific areas under specified lighting to ensure accurate readings. This technology cannot be set up just anywhere.” The technology can be installed in both large- and smallscale airports, as it is affordable and can be implemented according to various planning needs and available budgets.

Dangers Screened Out
For external screening of travelers coming into or leaving the country, biometric scanning does provide double prevention against possible security breaches. In some airports, a database of collected personal biometrics data is integrated and connected to government databases for quick referencing and tracking of suspicious persons. “The database can be connected to a similar installment, such as the FBI's identification system, or it can be maintained independently in the cloud,” Mahnken said.

Since 2002 in Europe, internal and external security systems in many European airports have already been interfaced with government databases to ensure air travel safety, said Arjan Bouter, International Sales Manager, Nedap Security Management.

Sky is the Limit: Airport Security Soaring into Smart Management

Sky is the Limit: Airport Security Soaring into Smart Management

Editor / Provider: Camille Shieh | Updated: 7/4/2011 | Article type: Infrastructure

Heightened aviation security since the 9/11 attacks and subsequent terrorist threats has brought along increased awareness, for danger can be detected or deterred before brought into the air.

As new airports continue to be constructed and existing ones upgraded, newer technologies like HD video surveillance, video content analysis and management software are gradually adopted to enhance the security and safety of complex airport and aviation operations. Security management of the entire premises is, thus, increasingly highlighted. One of the top challenges faced by system integrators today is assimilating new technologies and products into existing systems, as old and new systems often have trouble communicating with one another. However, should an airport project adopt technologies based on an open platform, integration would be much smoother, with extra cost minimized and existing investment extended.

It is common to find restaurants, retail shops, cafes — and even hotels, spa centers and casinos — in today's airports. “As airports provide a global transportation network among cities, they are important hubs and have considerable regional economic significance, giving the cities they serve great commercial advantages over those that do not have them,” said Uwe Karl, Head of Airport Solutions, Siemens Building Technologies. “Airports will undoubtedly continue to grow in number, and existing airports will continue to grow in size in order to satisfy the increasing demand for mobility. The systems employed to protect them, therefore, need to accommodate such growth, with a smooth migration path to allow systems to expand easily.”

Newer, Bigger, Better
The mature markets in North America and Western Europe see a continuation of security upgrades. “The sales outlook is promising as threat has not lessened,” said Mark Wilson, VP of Marketing, Infinova. “The biggest need requested by airports in North America is HD video surveillance.”

The US market is continuing at a good pace, fueled by the events of 9/11 and carried through up until the Obama administration, said Mark Moscinski, VP of Safety and Security, System Development Integration. “Federal stimulus funding has also kicked in for many airport security projects with design phases giving way to implementation projects; in fact, we seem to be only at a halfway point through the federal funds for the realization of our current projects.” In the last few years, large airports in Europe have had more difficulty with growth than smaller airports, and this trend will continue in the next five years, said Arjan Bouter, International Sales Manager at Nedap. “In Europe, large airports are looking for more flexible solutions to curb the impact of disruptions by extreme weather conditions and other disasters.”

Newer airports in the Middle East and Asia will also challenge the European ones, Bouter continued. “Obviously, this will have an effect on security management systems; new safety and security platforms will contribute to a lower TCO that improves the competitveness of European airports.”

New and upgrade projects in emerging markets, such as China, India, Southeast Asia, Eastern Europe, Russia and Latin America, see healthy growth in number. “We recently completed a project for 22 airports in India, in addition to other major projects in Easter Europe and the Middle East,” Wilson said. “For these projects, we used a combination of analog and HD cameras, and in many cases, they are taking advantage of the existing fiber optics.”

These regions are characterized by strong expansion. For instance, China has planned over the next five years 55 new airports to cover the expansion of traffic, Bouter added. “These regions will implement new security platforms, often based on open standards.”

Many airports in these regions are also undergoing a “face-lift,” and usually for these projects, HD and megapixel technologies are sought after in conjunction with advanced software like video content analysis (VCA), said Aluisio Figueiredo, COO of Intelligent Security Systems. Overall, the physical security market for airports is expected to double by 2016, said Julian Harris, Research Analyst for Aerospace and Defense in North America, Frost & Sullivan. “Perimeter security is growing significantly due to technology innovation and the push to protect patron safety. We see fiber-optic fencing experience more growth than traditional fencing, as the former continues to be invested in.”

In video surveillance, Harris sees more IP surveillance installed at larger international airports, while smaller airports opt for analog technology with less integration of disparate security systems. “In terms of access control, fingerprint readers tend to be adopted by larger airports, while smaller airports stick to standard access control protocol, suggesting that larger airports are exploring more options.”

Biometrics will continue to play an increasingly crucial role, agreed Scott Mahnken, VP of Marketing, Bio-Key International. “Convenience and security are paramount in airports, and biometrics are virtually impossible to corrupt yet involve no cards, passwords or tangible assets. Documents may be forgotten, but we will always have our fingerprints or other biometric attributes.”


Government In volvement
As most airports are state-owned, municipal, state and federal governments are crucial players in determining what security measures need to be set up in airports. “There is a maze of security and regulatory issues facing every airport,” said John Diedam, VP of International Sales, Ingersoll Rand Security Technologies. “It starts with a thorough understanding of Title 49 CFR Part 1542 of the US Homeland Security's Transportation Department, ranging from who must be in charge, how to become compliant and airport tenant security programs, to security of various locations within the airport, law enforcement and access control. The first objective is to reduce the complexity of this and all other pertaining regulations, along with the security ramifications.”

Next, one needs to determine and resolve airport security and fire safety vulnerabilities, Diedam continued. “Security could be almost perfect if everything was locked down and nobody could come or go, but that's not feasible. What needs to be done is to assure that security is at a high level but innocents can escape when needed. There's a compromise, and they are typically found within the regulations aforementioned and local codes and regulations.”

In the U.S., every commercial airport is owned and operated by a local government entity — city, county, state or port authority — each with its own political structure, funding capabilities, environmental/noise requirements and security/law enforcement support, said Art Kosatka, CEO of TranSecure (a member of the Association of Independent Aviation Security Professionals). “There are federal regulations, as well as state and local building and electrical codes and fire and life safety codes, which must be met.”

“We often see that local or state governments are strongly involved in the economic development of the region/country where the airport is situated,” Bouter said. “Under such circumstance, local solution providers are often favored to take on new or upgrade projects.”

Airports are used as hubs to create new business in many places, observed Gerard Otterspeer, Product Marketing Manager for CCTV, Bosch Security Systems. “At times, international consultants such as ADPI, COWI-Larsen, Bechtel and Parsons set the security standards in airport projects while they help clients plan and design aviation construction projects.”

New ≠ Best
While there are strict and high security requirements, not all airport projects use the latest technologies the security industry has to offer. “Airport clients are very savvy customers, knowing what they need and insisting that their integrators and manufacturers provide systems that meet their expectations for both performance and budget,” Wilson said. “With even new construction projects, it is not unusual to see analog video implanted in areas where it sufficiently does the job. In fact, there are many hybrid and coexisting systems at airports.”

“Airports focus on leveraging as much of their existing technology as possible; they do not have a rip-andreplace mentality,” said James Chong, CTO of VidSys. “Additionally, they tend to wait to use new technology until it has been proven in the marketplace.”

“Generally, we like to think in terms of first providing an initial concept of operations (ConOps) for the customer — what are you doing, why do you need it, where is it required, what is the threat you are addressing and what are the priorities,” Kosatka said. “This should drive the technology decisions, one of which might be that new technology in consideration isn't right for the airport's actual needs at all.”

Securing airports is a complex undertaking, remarked Larry Lien, VP of Product Management at Proximex (an ADT Security Services company). “Airports are continuously looking for ways to improve ConOps to best protect passengers and employees, as well as avoid poor publicity and lost revenue from security incidents. Some airports leverage the latest technologies to fit specific project requirements. They evaluate many factors to make the decisions, including the benefits, risk factors, costs and ROI for new technologies. Newer technologies, such as HD cameras, offer significant advantages because airports may leverage fewer cameras but still cover a large area. However, airports must still consider the ability of newer technologies to communicate with existing systems and fit within the ConOps.”

In airport projects, proven brands, solutions and products are preferred, while current technologies are followed in a general fashion, Otterspeer observed. “HD and even full HD products have gained popularity in this kind of projects for applications like forensic search and wide-angle viewing; however, during the course of a project, the technologies used can change.” Technologies used are much influenced by the consultants in many cases.


HD and VCA
Using HD video streaming can help extend the life of the existing analog cabling of an airport surveillance system while providing better forensic evidence and the zero latency needed for live monitoring using PTZ camera controls, Wilson Vertical Market said.

In airport security, the devil is indeed in the details. “HD delivers a wide-screen format that captures more useable image content, reducing the amount of empty sky or foreground in a scene if a wide-viewing angle is needed, such as at baggage claim areas,” Otterspeer said.

Motion sensor technology has certainly improved and can now detect farther and more precisely than previous versions, said Rolland Trayte, President of FutureSentry. “Solar-powered wireless sensors offer simple installation and add the detection range to 1,000 feet. Advanced applications can also add analytics to further ensure robust detection and reliability of alarming inputs, and enable the system to ‘learn' the difference between uniquely shaped objects.”

Adoption of VCA for airport monitoring remains low, despite a visible growth in the last couple of years. “VCA is used in about less than 10 percent of airport projects currently, with potential to grow moderately to 15 to 20 percent in the next few years,” Harris said.

“Security standards are not in place yet to get this widely adopted in the market.” Actual applications, Otterspeer added, include line crossings for external perimeters and wrong-way or loitering detection for strategic locations such as air traffic control towers, customs gates and aircraft ramps. “VCA is used from site to site, depending on what the project requirements are,” Moscinski said. “Currently, simple analytics are used most often, as the technology still has several barriers to overcome, such as unsatisfactory hit ratios and high FARs. Simple VCA like motion and object detection can help identify when someone has crossed checkpoints from the nonsecurity to the security side, alarm relevant personnel and provide evidence to assist with tracking and identifying the intruder. We see the most active VCA evaluation now taking place for use in perimeter security.”

Another key technology identified is ALPR, which is very common these days at Tier-1 (major) airports and is becoming increasingly common at Tier-2 and even some Tier-3 airports, said Jim Kennedy, President of Inex/Zamir. “The primary use is for parking revenue management to prevent ticketswapping fraud and subsequent revenue losses. Increasingly, we are requested to provide a ‘list-matching' capability to our system so that local authorities can be immediately notified if a vehicle that is on a watch list enters a specific parking facility.” The disappointment with VCA often stems from undelivered functions it promised in the beginning, Figueiredo said. “Many vendors are pushing less-than-ready VCA products out to customers to make quick cash even if the technology is still not mature enough for real-life usage, ultimately creating more problems for customers. The accuracy of VCA reading is, on average, 85 percent or better when utilized in a controlled environment with strategic camera position and correct lighting.”

HD, megapixel cameras and video analytics may provide improved inf o rma t i on and s i tua t i ona l awareness, but they introduce enormous operational costs in terms of bandwidth and storage requirements, and other issues such as forensic capability and privacy.


Drawing Together
In expansion projects, such as a midsize, domestic airport scaling to large, international airport or a large-scale airport expanding current facilities, new security systems and technologies, such as HD video, IP-based video and VCA, are often introduced. “These new technologies cannot be installed independently of other existing security systems and require shared information,” Lien said. “Security operators must use different consoles and different systems to manage incidents. The costs associated with operating independent and nonintegrated systems, such as training, additional skills required for reporting and longer incident response time, are significant.”

Yet connecting disparate systems under one central command is no easy task. “We face a lot of problems with legacy systems,” Figueiredo said. “Sometimes, there is no documentation, no SDK, or the company responsible for the system simply went out of business. System integrators (SIs) like us basically have to make sure that the systems work together through the use of an open-platform approach.”

“Typically, each installer/integrator is focused on making sure its own system is installed and runs correctly,” Lien added. “Expectations of how to integrate and what an integrated system can realistically accomplish could often be miscommunicated. Entities that require communication between systems should find an experienced SI that can help them set clearly defined goals for their environments.”

For security purposes, central management software like physical security information management (PSIM) is a good way to maintain unified control over different systems in operation. “A true PSIM solution enables one complete and intelligent security system by aggregating information from various subsystems and automating processes as appropriate to effectively manage situations,” Chong said.

PSIM software is a good option whenever doing a significant expansion or a new project, added Joshua Koopferstock, Director of Marketing, Feeling Software. “Multiple systems, mapping and SOPs should be combined within a single software package, and this common operating picture in airports is becoming increasingly important as security systems become bigger and more complex as the facility expands in size.” To facilitate smooth integration of hardware and software, as well as the old and the new, adopting an open approach that grants partners with access to their SDKs and APIs is vital, Koopferstock said.

“Oftentimes, SIs and PSIM vendors combine their knowledge of and expertise in physical security technologies, process management, and security policy and compliance to provide organizations with a complete situational awareness and management solution,” Chong said.

In addition, SIs and airports should work together to consider their ConOps and how the systems should function after integration, Lien remarked. “Understanding process flows, automating tasks, correlating information and giving usable information to operators will help airports optimize their operations and realize cost savings.”

Many are now focused on quickly identifying situations and disseminating the information to the guards, police and other necessary agencies in real time, Chong said. “Airports are also starting to use a single security asset, such as a camera, for multiple uses. For example, security may use a camera to see if someone is walking around the runway, while air side operations may use the same camera to verify if the gate is available for an arriving flight.”

The growing complexity of daily airport operations demands equally diversified security systems. Smoothly integrated systems, such as access control and people tracking, will help with the fluidity of security management on aviation premises. Biometrics, the new kid on the block for airport access control and ID authentication, will be explored next.

Prominent American University Secures New Facility with L-1 4G Fingerprint Readers

Prominent American University Secures New Facility with L-1 4G Fingerprint Readers

Editor / Provider: L-1 Identity Solutions | Updated: 6/23/2011 | Article type: Education

While the use of biometrics in higher education is still relatively a new concept in North America, it has seen success in the few facilities it has been implemented in. The latest educational institution to implement a biometric access control solution is considered to be one of the top research universities in the world. By day, over 40,000 students roam the campus grounds and by night over 10,000 university housing residents go back to their residence halls and plazas.

With such a large student population, security becomes a big issue. “Their brand new facility needed to incorporate a number of features, that would reflect not only the progressive nature of the institution but also address the critical security issues of an on-campus police station”, said Shiraz Kapadia, COO, Bioscrypt (The Enterprise Access Division of L-1 Identity Solutions). Access to new rooms such as a holding cell and the transportation and protection of evidence transferred from the main station into the secure property room, required restricted access to certain personnel.

Critical tasks such as the ones mentioned above, called for a physical access control solution which would be robust enough to handle the different layers of security clearance within the building, but still simple enough to handle the management of the system. Enter Bioscrypt (The Enterprise Access Division of L-1 Identity Solutions) and their market-tested and customer proven 4G solutions.

Secutech 2011 Holds the Key to Future Security

Secutech 2011 Holds the Key to Future Security

Editor / Provider: Submitted by Messe Frankfurt New Era | Updated: 6/15/2011 | Article type: Hot Topics

Secutech 2011 reached new heights for its 14th annual exhibition. This Asia's most international exhibition and conference for total security solutions took place from April 20 to 22. Over three days, tens of thousands of security professionals came for the latest in products, solutions and conference topics.

Asia's security demand has boomed in recent years, due to growing security awareness and strong economies. The 14th edition of Secutech, the international exhibition and conference for electronic security, showcased the latest products. Offerings included the largest IP equipment pavilion in Asia, access control/biometrics, HD surveillance, intrusion alarms and home automation. Numerous global brands displayed a wide variety of products, enabling buyers to find the right solutions for their needs under one roof.

A strong turnout of 23,782 international and local visitors packed the floors, making their way to exhibits as well as attending educational seminars. Attendance increased by 5 percent from 2010, with visitors flying in from more than 95 countries to Taipei. The show was a one-stop shop for distributors, resellers, importers and integrators to connect with solution providers.

Business-matching sessions connected buyers from specific countries with reputable suppliers. Buyer groups included decisionmakers from Japan, Singapore, Turkey, Italy, Thailand, Vietnam and India.
Total Security Lineup
Secutech 2011 hosted 550 suppliers spread out over 35,873 square meters. Exhibitors showcased a total security lineup, hailing from more than 20 countries. From key components to finished products and vertical-specific solutions, Secutech was the best sourcing platform for professional security buyers. Global manufacturers and component suppliers turned out for Secutech, making it a truly representative exhibition.

Video surveillance was represented by more than 150 manufacturers, including Brickcom, CNB Technology, DynaColor, GVD, Hikvision Digital Technology, iCatch, Infinova, ITX, Koukaam, Nuuo, Pinetron, Qnap, Sony, Vivotek, and many more. Products displayed featured software, recording storage, megapixel cameras, video analytics and VMS.

Two new product zones made their debut this year: Software and Storage.In conjunction with the show's themes of HD/Megapixel, Software and Storage, the software zone featured globally renowned providers such as Milestone Systems, ObjectVideo and Pelco (a Schneider Electric company). The Video Storage and Recording zone covered 200 square meters in the IP surveillance pavilion, rounding out the range of video solutions in the HD era.

The access control and biometrics pavilion of 116 booths covered everything from card readers, IP access control solutions, e-home systems, face recognition, fingerprint scanners, palm vein technology to intercoms and electronic magnetic locks. Security auditing solutions such as RFID products and technologies were also displayed. Leading brands on-site included Assa Abloy, ChiYu, Entrypass, HID Global, Kaba, MicroEngine and Rosslare.

The third CompoSec — the only international expo for components in security technologies and applications — was held concurrently with Secutech. CompoSec completes the security supply chain, covering a spectrum of key components ranging from chipsets and modules to subsystems and embedded software.

Exhibitors include Intel, Intersil/Techwell, Hitachi, LG, OmniVision, Grain Media, Stretch, Texas Instruments, Xilinx, Gennum, Clairpixel, Pixelplus, Kiwi Semiconductors and Macro Image. A new zone for CompoSec 2011 was the Memory Storage zone, gathering hard-disk drive (HDD) and flash disk providers under one roof. Renowned brands such as Western Digital, Transcend, Innodisk, Apacer and Hitachi displayed storage solutions expressly for surveillance purposes.
Show Attractions
Intelligent Buildings and Smart Homes
Intelligent buildings and smart homes are increasing, as building automation becomes a reality. Secutech 2011 enabled greater dialogue at the Home Automation pavilion, which welcomed representatives of intelligent building associations and organization from China and Korea.

Camera Excellence Award
The Camera Excellence Award was a world-first camera shootout at the showground, allowing objective judges and discriminating buyers to determine the best megapixel and HD cameras from live performance.

A total of 25 cameras were tested on-site, including 19 megapixel cameras and six HDcctv models. HDcctv camera entrants included CNB, Hi Sharp, EverFocus Electronics, Micro Digital, Mintron and Shany. Megapixel cameras on display featured Axis Communications, Arecont Vision, Brickcom, Brainchild, Dahua Technology, D-Link, EverFocus, Etrovision Technology, Hikvision, Huanghe, Panasonic System Networks, Shany, Sony Corporation, TeleEye and Vivotek.

Hundreds of visitors stopped to observe how the cameras delivered and cast their votes for the top performers. After a two-day voting period and professional judge panel discussion, the winners were announced. HDcctv camera awards were presented to Micro Digital, Mintron and Shany. For megapixel cameras, six models from Axis Communications, Brainchild, Brickcom, Panasonic Systems, Sony Corporation and Vivotek were recognized.

Country Pavilions
Country pavilions allowed security professionals to identify mutual growth opportunities and develop a competitive edge. This year's pavilions included the U.S., Korea and China.
Quality Education
Secutech 2011 not only featured comprehensive sourcing options, but also showcased top-notch security education. A total of 20 seminars, comprising 115 interactive sessions, makes Secutech the premier security destination in Asia. Conferences held concurrently at the show were the Global Digital Surveillance Forum (GDSF) and CompoSec.

Three Keys: HD /Megapixel, Software and Storage
GDSF is a conference dedicated to digital video solutions. In its 10th year, the conference was divided into three tracks: HD/Megapixel Surveillance, Software and Integration, and Storage Management.

1. HD/Megapixel Surveillance Forum
The keynote of the HD/Megapixel Surveillance Forum was delivered by Hiroshi Sekiguchi, IP Security Product MD, Panasonic Systems. He delved into the IP video surveillance market trends, discussing how to truly integrate megapixel technology.

Followed by Panasonic were Axis Communications, Hikvision, Vivotek and EverFocus. Fan Look, VP of Axis North Asia, explored market development in network video in storage, new sensors and adaptability. Both Hikvision and EverFocus showcased real-life applications of traffic monitoring with network surveillance.

Vivotek presented the latest breakthroughs in storage and recording. This was followed by D-Link's presentation on video analytics and VMS solutions. The last two sessions were delivered by Plustek and Osram, detailing how to best make use of video surveillance.

2. Software and Integration Forum
The Software and Integration forum kicked off with a presentation by Firetide. Firetide discussed video mesh technology and how to deploy it for critical applications. It was followed by a keynote speech from Pelco (a Schneider Electric company). “Integrated security meansbetter protection for people, assets — and the bottom line,” said Pramoud Rao, Security Ambassador for Asia
Pacific, Schneider Electric.

ObjectVideo discussed the value of analytics, along with addressing issues with interoperability and flexibility. Open platform VMS providers Genetec and Milestone Systems discussed third-party integration, a critical issue as more convergence takes place.

3. Storage Management Forum
The Storage Management forum's opening speech was delivered by Seagate. Danny Lim, Marketing Manager for Asia Pacific, Seagate, explored how the adoption of HD and megapixel cameras changes storage requirements. As a newcomer to GDSF, Promise also addressed storage management.

Three sessions focused on IP product launches from Brickcom, ArcSight and NVT. Taking place over three days, GDSF was made up of 18 sessions, covering the full spectrum of IP video.
Product Design for HD Surveillance
CompoSec 2011 covered four themes geared toward engineers and R&D professionals: HD Surveillance, Improved Transmission and Interfaces, Next-Gen Identification and Management, and Green Security. This year's opening speeches were delivered by Intel and Huper Laboratories, discussing HD performance.

Texas Instruments delivered the keynote speed at CompoSec. Sunny Lee, Director of Business Development for Texas Instruments, explained how embedded technology supports more green video products.

Sony's presentation introduced new technologies for generating higher resolution, lowering S/N ratio and improving color reproduction.

Aptina, Aspeed and Pixelplus explored breakthroughs in CMOS image sensors. Aptina's image sensors boost

Secutech 2012
Dates: April 18 to 20, 2012
(15th edition)
Venue: Taipei Nangang Exhibition Center, Taiwan
resolution, enabling cameras to perform more accurate video analysis. Aspeed presented how best to perform server management, desktop virtualization and surveillance processing.

HD was the emphasis for Hisilicon and Grain Media. Grain Media not only focuses on network cameras, but plans to expand to hybrid DVRs and NVRs.

Solution design was an emphasis for product development. Stretch spoke on the importance of integration, video analytics and image processing.

Xilinx highlighted effective processor performance, even with lower power consumption. From the HDcctv perspective, Gennum explained how transmission can be extended for HD images.

Storage plays a crucial role in video surveillance, providing effective and reusable evidence. HDD and solid-state disks (SSD) work to provide effective recording. “A good SSD is worth every penny,” said Alex Kuo, President of Memoright. Both speed and performance determine the quality and scalability of storage. Innodisk stressed how different applications require individual SSD solutions. Western Digital, which announced its intent to purchase HDD competitor Hitachi Global Storage Technologies, further elaborated on the challenges of HD storage.

The last session of CompoSec was closed by NXP. RFID usage, ranging from automotive, identification, wireless infrastructure, lighting, industrial, mobile, consumer and computing applications, was discussed. The presentation looked at how the technology could be used in the future.

Secutech 2011 proved to be Asia's top annual security show. Combining technologies, conferences and networking opportunities, the exhibition is consistently the most professional platform for security in the region.

First Page< Prev< | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 >Next >Last Page