You are at : Search > Articles Search Results

Articles Search Results

153 Articles and 17 related Products found for Siemens

Vietnam: Maintains Momentum Despite Economic Hurdles

Vietnam: Maintains Momentum Despite Economic Hurdles

Editor / Provider: The Editorial Team | Updated: 9/7/2011 | Article type: Hot Topics

Vietnam's economic growth continues to boom, but it feels the growing pains of inflation and a depressed currency. John Shi, a&s Editorial Director, explores key trends in security and hot market segments.

Southeast Asia weathered the financial downturn with nearly no ill effects, which was evident in Vietnam. Government estimates peg 2010's GDP to grow 6.5 percent in a flat global economy, country an investment target for multinationals. Corporations such as Intel and Samsung have set up production facilities in the country for its stable government, young work force and low- cost labor.

However, 2011 ushered in new challenges. Inflation has increased with economic growth, reaching 7.5 percent. While the government plans to curb inflation, this has resulted in tighter credit.

Electricity and energy costs have also risen to more than 18 percent, taking a toll on the bottom line. As the cost of living increases, salaries are expected to increase 30 percent.

However, public employees are unlikely to see doubledigit growth on their pay slips, as the government has slashed spending by 10 percent. This has put a damper on public security projects, which have been delayed or reduced in size.

Not all is bleak for security. A number of infrastructure projects are still on track, such as a high-speed railway connecting north and south Vietnam over 1,630 kilometers. While the market While the market is affected by economic pressures, the overall outlook is positive for Vietnam.

Vietnam has mercifully been spared of major terrorist attacks. It is also on good terms with its neighboring countries in the region, making it a safe place. While a low risk of homeland security attacks makes Vietnam a good place to do business, the minimal threat level also slows equipment sales. Physical security is usually the last priority on public projects, resulting in analog enjoying a market share of 80 percent, according to some industry experts.

Partly because of the low threat levels, as well as low crime rates, Vietnam has relatively little security legislation, except for fire codes. Video surveillance, access control and intrusion are not mandated, reducing demand for security equipment.

Security demand is further reduced by cheap manpower, as guards are deployed for most sites. “Especially in Vietnam, there are police almost everywhere and the public believes the police are enough,” said Sy Nhat Le, President and CEO of Tan Bao Information Solutions. “Even in places equipped with cameras, customers do not know how to use them properly. So the majority of the market still prefers security guards.”

Security awareness is relatively low among users. “There's a Vietnamese saying, ‘Lock the door after the thief has come in,'” said Van Hung Chu, Director of Tanthanhan. “No beforehand planning is part of Vietnam's culture.”

However, people are becoming wealthier and understand the need to protect their possessions. Increased media reports of crime, either through the Internet or television, have raised awareness and made consumers more interested in security equipment, said Gordon Tat, MD of Ion, a distributor. The concept of home insurance has yet to become mainstream, but more homeowners are taking measures to protect themselves.

Hanoi, the nation's capital, is driven by government projects. Roughly 80 percent of northern Vietnam's security market consists of public projects, making the government one of the largest buyers.

However, the bulk of security projects take place in southern Ho Chi Minh City, formerly known as Saigon. As the financial hub of Vietnam, Ho Chi Minh City's security market is about three times the size of Hanoi's, said Tran Trung Vinh, President of Silver Sea, a local distributor. Vietnam's regional breakdown for security finds 70 percent of business in the south, while the north makes up 20 percent and the central region forms the remaining 10 percent. [NextPage]

Banking is one vertical that does require video surveillance, providing forensic evidence in the event of a customer dispute or robbery. Government mandates for ATM surveillance are driving growth across Vietnam's 20 banks. More technical standards, such as day/night cameras to monitor safes, are being developed by the central police authority. However, current bank regulations allow each branch to select equipment as they see fit, with price usually being the deciding factor.

Competition is fierce for video surveillance, with an estimated 600 security companies operating in Vietnam, said Tran Hai Trieu, Director of TNT Technologies. As the overall market size is small, distributors cannot survive with a single offering. This means carrying solutions for all price points — high-end, mid-range and budget product lines. It also means diversifying product portfolios beyond video surveillance to access control and intrusion alarms.

One of the challenges for wider video surveillance uptake is a perceived lack of results. “In a well-known murder case in Vietnam, a camera did capture the killer's face, but the image was hard to identify,” said Duc Hau Do, President and CEO of Techpro. “In the end, the killer was caught by the police, but the camera did not serve its function.”

IP surveillance is seeing uptake in new projects, but analog solutions are still dominant for cost reasons, particular in corrections and casinos. However, users with multiple sites will invest in network video for remote monitoring. “IP is the future and is also happening now,” Le said. “However, it depends on the level of integration the owner wants to manage.”

Analog's market share is estimated to be as high as 80 percent, but IP is gaining ground. Some banks will deploy network cameras for all ATMs, with one bank installing nearly 3,000 cameras. Large high-end projects will almost all use network video, but analog still sees demand in smaller applications.

Management software and video analytics are starting to see increased adoption, as importers take note of their value-added functions. Silver Sea is working on its own traffic monitoring VMS to complete its portfolio, Vinh said. Access control is growing, but does not see much demand apart from mechanical locks. Electronic access solutions are limited to time and attendance applications, with Korean solutions seeing the most representation. “Video surveillance is a highly competitive market, while access control is not,” Trieu said.

Building automation is dominated by Siemens Building Solutions. It faces competition from Schneider Electric, which entered the market later. Both emphasize complete solutions as opposed to equipment, to manage elevators, air conditioning and lighting in large buildings.

Each vertical market in Vietnam is fragmented and requires a unique approach. They also have distinct differences that need individual solutions. Currently, the most active markets include critical infrastructure, transportation, financial institutions, industrial applications, residential homes, commercial buildings and retail. Growth is expected from private investments, as well as foreign direct investments, said Cong Duc Duong, President of Viet Phone.

Retail emphasizes entry-level offerings in video surveillance and intrusion, Tat said. Network cameras are seeing strong uptake for chain stores and supermarkets. For government projects, corrections is a significant market for security. There are currently 12 existing facilities nationwide, with a number of updates planned for sites dating back to the French colonial days.

While most Vietnamese security players are distributors, some have changed their business models. Vantech started out as an installer, importing equipment from Asian manufacturers. As its distribution grew, it faced increased pressure from suppliers to meet sales targets and instead chose to assemble its own video surveillance products. “Our local production, along with service and repair team, has become our selling points,” said Brandon Lim, Overseas Business Director of Vantech. Its support team aims for speedy repairs, as technical issues with imported products can take much longer to ship back to the supplier for repairs or replacements. Vantech offers a three-year warranty, making after-sales service a priority, Lim said.

Several hurdles limit security growth in Vietnam. One issue is that users are very price-sensitive, said Trong Manh Ung, Technical Manager of Nhat Nam. As most users do not understand security, they choose the cheapest products.

This places the burden on the distributor to explain the value delivered by a solution. “Customers can't distinguish the good brands from the bad ones,” Duong said.

So it's difficult to sell expensive products.” Local installation know-how is also limited. “Large projects must hire foreign consultants or integrators,” Vinh said. “Basic understanding of installation has to be imported, or else local installers have no way to learn new knowledge or pick up new technologies.”

Along with a lack of hands-on experience, local security players also need to keep up with government rules. Policy updates take place frequently, making it tough to stay current, Tat said. [NextPage]

Security players are confident 2011 will yield stronger growth compared to 2010. “We grew 60 percent growth in 2010 and expect to have 80 to 90 percent growth in 2011,” said Trinh Xuan Vinh, Vice Director of Business, Viet Hoa Electronics. While government projects are slightly down, private security business continues to be brisk.

Panasonic enjoyed strong sales growth of 30 percent in 2010 and expects that to increase to 50 percent in 2011, said Minh Cuong Nguyen, Sales and Marketing Executive, Panasonic Systems APAC. This is from its many IP video projects throughout Vietnam.

With the falling value of the Vietnamese dong, public projects will see a slowdown. “Inflation has resulted in the government setting tighter lending policies,” Vinh said. The exchange of US dollars is being controlled, resulting in higher import costs that directly affect importers and distributors. Nearly all equipment is imported, although there are notable exceptions of local manufacturing.

Vietnam is developing into a pivotal security market. As it faces the growing pains of a booming economy, Vietnam is emerging as a land of opportunity

Keys to Implementing Optimal Perimeter and Intrusion Detection Systems

Keys to Implementing Optimal Perimeter and Intrusion Detection Systems

Editor / Provider: a&s International | Updated: 8/17/2011 | Article type: Tech Corner

After selecting the right products, a few points should be kept in mind during installation. Detector sensitivity, necessary tampering prevention and price/performance considerations should be thoroughly discussed and understood by system integrators and end users.

When installing or upgrading perimeter and intrusion detection systems, the first thing to check are local standards. In the U.S., the Department of Homeland Security outlines new federal security regulations through the Chemical Facility Anti-Terrorism Standards program. Similar efforts are also in place in Canada, as shown by the Canadian Nuclear Safety Commission for nuclear sites. Several countries in the EU also implemented different protection levels — Grade 2 for monitored systems and Grade 3 for public and high risk sites. There is a gradual trend to make EN50131 national security standards mandatory for all intrusion systems that are monitored in Europe.

Detection sensitivity is important in an effective perimeter and intrusion detection system. Fine-tuning detector sensitivity is a necessary procedure after installation, as end users do not appreciate a system that is either nonresponsive or overly responsive. Typically speaking, correcting detector sensitivity is to lower nuisance alarm rate (NAR) — alarms caused by an environmental stimulus such as rain, animals or lightning — more so than false-alarm rate (FAR).

“The install site will have predetermined levels of acceptance for detection, FAR and NAR that the system must achieve,” said David Curtiss, Director of Engineering at Smarter Security Systems. “Initial calibration is generally performed with a specialty tool or human subject. The performance of the system should then be exercised until the requirements are met. After the system is operational there still may be some fine-tuning to find the optimal settings. Generally, within 30 days of installation the hardware will have proven itself and the users will have become familiar with the system operation. Regular maintenance is recommended to ensure proper operation.”

Take fence sensors for instance. Achi e v ing g o od re sul t s i s a combination of site preparation and maintenance work, proper installation and the degree of “smarts” built into the sensor, said Stewart Dewar, PM of Senstar.

“Site preparation ensures that the fence fabric is reasonably tight to minimize excessive movement under windy conditions, and also removes or secures any loose objects striking the fence, such as signs or tree branches,” Dewar explained. “For a fence sensor, proper instal-lation means that the sensor cable is securely attached to the fence and that an appropriate threshold is set. A modern fence sensor will provide Windows software that allows sensor configuration and testing to be done via interactive screens. Modern fence sensors will also use advanced digital signal processing techniques to optimally discriminate between real intrusions and nuisance alarms.”

Sensitivity levels need to be adjusted throughout the day, depending on activities in daytime and nighttime. Also, required sensitivity levels correspond to the threat level of the site protected. This can be configured by setting up different zones, which limits the number of active sensors in the system during daytime — such as acoustic and contacts only — while making all sensors active during nighttime, said Luc Joosens, Detection Product Management Leader for EMEA, UTC Fire & Security. “Another way is to use standard high-sensitivity sensors, such as mirror-optics motion sensors, that are only active during nighttime to ensure maximum sensitivity when required.”

“Typically this will be done via arming/disarming procedures independently for areas or zones,” added Juergen Grasmehr, Global Portfolio Manager of Intrusion and Perimeter Systems, Siemens Building Technologies. “These procedures can be triggered by users via a management station, field devices such as lock or access readers, or automatically by schedulers.”

Some advanced systems collect information like environmental conditions or special settings — day, night, working time and more — to adjust sensitivity automatically, Grasmehr said.

A good perimeter and intrusion detection system should be designed with tampering prevention in mind. Without appropriate tampering detection, the perimeter and intrusion detection system could be at risk for malfunctions. Some basic tampering detection include: mechanical tamper contact, anti-masking and anti-blocking detection, encryption, discrimination detection, sporadic cut alarms, mechanical and electronic adjustment detection.

The first level of protection is a housing tamper, which triggers an alarm when the cover of a sensor or control panel is opened, Joosen said. “A second level of protection, which is required in public and high risk environments, is a pry-off tamper which is triggered when the device — control panel, keypad or sensor — is removed from the wall.”

“A micro-switch should be in place to detect removal of the sensor cover and monitor sensor, and communication cables to detect cutting or short-circuiting,” Dewar said. In the case of a microwave volumetric sensor, it has a built-in fraud protection; the system will monitor the signal received at the receiver unit and trigger an alarm if the signal level falls below a set threshold or a jamming signal is detected.

Cable sensors are by nature sensitive to detect tampering and the circuitry enclosure is protected by security hardware and trip switches, Curtiss said. “The more sophisticated systems employ digital signal processing to detect network ‘spoofing' attempts.” Periodic maintenance should also include checking up on the tamper-proof condition for the system to deliver optimal performance.

The maxim “You get what you pay for” holds true in perimeter and intrusion detection procurement. Budget offerings typically sacrifice features and functionality, said David Smith, CEO of Optellios. “ Feature s such a s int rus i on pinpointing, cut immunity and multiple simultaneous intrusion detction are not seen on low-budget offerings.”

Security is very much like insurance policy — how one proves the ROI; however, the risk of crime, vandalism and loss of production should be considered, Dewar said. “Once the investment is done, the comparison is between low-cost and high-end solutions. Here, the customer will feel the difference through: integration TCO, documentation level, maintenance by the system integrator, ease of recalibrating the system and more. A well-maintained and calibrated system would last decades.”

Leaving cost and technical considerations aside, external site factors such as landscape (flat or hilly) and climate (rainy, dry or harsh) influence the performance of any product. For virtual fencing systems, such as radar or infrared beams, weather and climate conditions do not cause interference. However, devices need to be carefully placed and aligned so that the signals are sent and received accurately, meaning that precise engineering of products is a must.

More importantly, the quality of the installation, setup and maintenance could affect product performance. For instance, a site that includes an open area would be well-served with a buried cable system, which provides a wide detection zone that is immune to most sources of environmental nuisance alarms and is difficult to defeat since it is covert, Dewar explained. “For sites without such a clear-zone, a fence-mounted sensor with a continuous sensor cable can be used to detect fence vibrations and a digital processing system to analyze the vibration patterns to differentiate real intrusion attempts from nuisance alarms. If there is no clear zone or a pre-existing fence, a barrier sensor such as a taut-wire system is an option since it provides the deterrence and delay aspects of a fence, along with integrated sensors to detect an intrusion.”

“The No. 1 thing that can be done is to make sure that the end user is getting the right sensor for the application,” Dewar suggested. “As of yet, there is no one sensor that works well in all environments. For any given infrastructure site, the optimal physical intrusion detection system will depend on the specific site conditions.”

Sharpen Your Senses: Securing Boundaries with Perimeter and Intrusion Detection Technologies

Sharpen Your Senses: Securing Boundaries with Perimeter and Intrusion Detection Technologies

Editor / Provider: a&s International | Updated: 8/17/2011 | Article type: Tech Corner

Perimeter security and physical intrusion detection are crucial for critical infrastructure and large-scale commercial complexes. Whether for government and military facilities or commercial-industrial areas, having a reliable and efficient risk-deterrent system on the perimeter of any important site is now mandatory. On a global scale, there is much room for growth — IMS Research forecasts that in 2011 the intrusion detection market will surpass US$2.4 billion, and the perimeter security market will reach about $400 million. a&s explores the latest market update and technological developments in perimeter and intrusion detection, as well as key considerations for selecting and installing a complete system.

Market potentialand sales performance for perime terse curity and intrusion detection products depend on the region or country's recovery from the recent recession, according to industry experts.

Retrofit projects tend to take place in mature markets, while new projects occur in emerging markets. “The increase in demand is almost directly related to a country's GDP growth rate and economic recovery,” said Luc Joosens, Detection Product Management Leader for EMEA, UTC Fire & Security. “Countries that have experienced economic recovery in 2010 have demonstrated an increased demand for intrusion detection systems.”

The Americas and Asia markets have strong demand for perimeter and intrusion detection products. "The Asian markets have been driven by construction growth, low unemployment, high GDP, a growing middle-class and increased government spending," said Blake Kozak, Market Analyst for IMS Research. "The American intrusion market is forecast to be especially in demand because of the move away from traditional PSTN communications toward GPRS and wireless connectivity."

“The Gulf region is a growth market for us, and we are actively developing our base there,” said Stewart Dewar, PM of Senstar. “In terms of emerging markets, India continues to hold opportunity for perimeter intrusion detection system (PIDS) companies as do Mexico, Colombia and Brazil. We have also recently opened an office in Singapore to address this region more aggressively.”

Several manufacturers concur with IMS Research's prediction on the perimeter security and intrusion detection markets. “To achieve US$570 million in 2014, the market would need to experience growth more than three times over what was seen from 2009 to 2011,” said David Curtiss, Director of Engineering at Smarter Security Systems.

“While that type of growth seems aggressive, government programs are placing requirements on critical infrastructure facilities that will need to be fulfilled. Also, there are new video management and analytic technologies now offered to replace or augment existing infrastructure.”

Conservative players have less bullish estimates, although they agree that GDP growth and government programs will drive this market. “The US market, for instance, will turn around over the next couple of years with regulations such as Chemical Facility Anti-Terrorism Standards for the petrochemical industry. The International Ship and Port Facility Security Code in relation to the seaport market is already impacting perimeter security business in Africa and other places,” Dewar said. “The next three years should give the sluggish markets, particularly in Europe, time to rebound and get back on track. In many cases, projects have not been cancelled but rather delayed or pushed off to deal with the economic challenge.”

Others are even more optimistic about potential growth. “The worldwide perimeter security market should reach even more robust levels as new technologies are integrated into comprehensive solutions,” said James Ionson, CEO of Oncam Global. “Open perimeters, such as deserts or waterways, with few, if any, obstacles to access, present new challenges for the industry to address. The spike in piracy at sea and terrorist activity can be expected to result in the need for enhanced security systems for both commercial and luxury travel vessels, as they extend surveillance from a liability focus to also include perimeter security.”

Perimeter security and intrusion detection products are more complex and powerful than ever. End-user behavior has also shifted from using individual products to combining various detectors and sensors for holistic protection. “As a result of the fact that basic detection technology has been getting better and more advanced, the coverage of different risks is currently much better than some years ago,” said Juergen Grasmehr, Global Portfolio Manager Intrusion and Perimeter Systems, Siemens Building Technologies.

“It is now possible to cover almost any kind of areas or objects, such as fences, walls, ground, water, air, building roofs and building facades. Together with other technologies like video surveillance, it is now possible to have very high detection quality combined with an automatic, sophisticated verification thanks to automatic camera tracking, zooming, object classification, visualization in overview maps and the like.”

One way to provide greater security at critical infrastructure sites is to combine multiple security technologies. “Indoor detection systems can be expanded with perimeter protection for advanced warning, while multiple technologies can be combined in the perimeter protection, such as fence and active IR; fence and microwave; motion and video surveillance; or combinations of these,” Joosens said. “Improved anti-masking technology reports sabotage attempts to the security system, and finally the increased use of video surveillance cameras with higher image quality and longer range provides better security at key sites.”

IR with microwave, quad pyro elements, multicurtain laser and 3-D detection based on time-of-flight technology are some examples of basic detection technology becoming more advanced, Grasmehr said. “Also, detector information can be delivered faster and more precisely with current technology. For instance, placing a number of alarms in a specific zone from different detectors can increase or decrease the real alarm probability.”

For outdoor detectors , the increased development quality, as well as manufacturing quality of electronics and mechanics, is manifested in affordable high-end products such as laser scanners, radar detectors, high-end fiber optical detection systems or piezo dynamic sensors, Grasmehr said. “New sensor systems are more flexible, and in some it is possible to run and combine multiple, complex detection algorithms on one detector at the same time. For instance, a laser scanner is able to detect small object in one area and large object in another area.” Dual motion sensing technologies — such as double passive infrared (PIR) or PIR with microwave — are also gaining popularity, as combinations are capable of achieving higher false alarm immunity, Joosens said.

“Using the latest K-band dual technology, this kind of sensor verifies the PIR signals with the microwave signal prior to any alarm decision and is less likely to trigger false alarms as K-band microwaves do not penetrate walls and glass as easily,” explained Tony Makosinski, External and Security Industry Liaison, Honeywell Security.

“Therefore, faster and more reliable detection is achieved, and false alarms and associated intervention costs are reduced. As this technology becomes more developed, it is increasingly taken up by the rest of the industry.”

For fences, cable sensors deploying fiber optics and coax are prevalent today, said Curtiss. “For fences with detectors, PIR detectors offer superior performance when complemented with a perimeter security system in areas such as gates, roads or any location that may require trenching.”

Buried fiber-optic systems appear to be taking the lead versus radio frequency/leaky coaxial types of sensors in underground detection due to their immunity to water, lighting and soil conditions, said David Smith, CEO of Optellios.

“Although fiber optic technology is not new, the prevalence of its use in security deployments is on the rise compared to strain gauge, microphonic and shaker systems, because it is easy to install.” Fiber requires no electronics on the fence, no additional power and is immune to lightning and radio interference. It has sufficient bandwidth to handle video and access control communication. Detection technologies initially developed for military applications, such as radar detection, are more common in civil security projects, Grasmehr added. “The radar system could detect and track a person from a considerable distance before he or she is even near the fence or up to the fence line, and continues to track once the person has entered the fenced perimeter,” said Jason Burger, Sales and Marketing Manager, Navtech Radar. “Radar does not require light or good weather to function, and would work in all light and weather conditions.”

“Some airports are using radar arrays that are configured to detect movement in both the X and Y axes. This data is then combined to produce a 3-D display of the target,” Curtiss said.

PSIM and mapping software are coming into the spotlight with more offerings from established leaders and startups, especially for critical sites operating with multiple security systems. “The ability to integrate the many disparate security devices and locations within an organization into a common operating platform that enables efficient assessment and response from a command and control center as well as field personnel is highly desirable,” Curtiss said. For entry-level security management, alarm integration modules enable fast deployment interfaces to other security subsystems, using dry contacts for handshaking, Dewar said.

To facilitate integration between PIDS sensors and a security management system (SMS), it requires several things from the PIDS vendor. “First, a well thought-out software architecture — one that provides sensor management tools that can be used at the same time the PIDS software is exchanging information with the SMS, and one that allows the SMS to do a query for the current status of all sensors,” Dewar said. “By having this capability, after a power-up or restart, the SMS can quickly be synchronized to the state of the perimeter system. Second, a comprehensive SDK is required that clearly documents the protocol by which alarm and status information is exchanged and that provides a high-fidelity simulator so all sensor events can be simulated in software to test the eventual integration.”

The addition of video surveillance and VCA maximizes the effectiveness of a perimeter or intrusion detection system, which can both be managed through central management software. Video verification is carried out by PIR that triggers a camera and sends snapshots or a compressed video clip via the control panel to the monitoring station or directly to the end user for verification of the alarm, Joosens explained. “Both wired video verification systems as well as wireless video verifications systems exist, but as the distribution of the images is handled by the control panel, the systems are typically proprietary to the control panel manufacturer and interoperable with other intrusion systems. There are major differences in the various systems on the market in terms of the type of image sent, the image quality and the transmission time.”

“Video verification and analytics is a necessary combination that end users need to implement if they can. Let the PIDS detect the intruder and let the video provide the video surveillance to determine the appropriate response,” Smith said. Video surveillance solutions that interrogate and verify potential threats enhance the effectiveness and efficiency of perimeter security systems, Ionson said. “They enable timely and measured responses while dramatically reducing costly false alarms. Using 360-degree imaging, with its total situational awareness, to trigger a colocated PTZ camera to quickly zoom in on a suspicious event increases both the speed and accuracy of threat verification.”

Choosing the right perimeter security and intrusion detection products depends on the site that they are supposed to protect. There is no one solution for all perimeter security applications and each application should be approached with this knowledge, Dewar said.

“While specific challenges from site to site still exist, the introduction of standards across the board has led to significant advancements in the reliability of physical intrusion systems,” Makosinski said.

When considering critical infrastructure, the requirements for intrusion detection are moving toward higher security, meaning better capture performance, better signal analysis and better communication solutions, with multiple paths and better integration into other subsystems, said Dennis Petricoin, VP of Product Management for Intrusion Detection, Bosch Security Systems. “We continue to see integration and flexibility as a key part of the industry's future.”

Selecting suitable products that satisfy end user requirements is only part of the equation. The second part of this feature explores key considerations system integrators should pay attention to during and after installing a perimeter and intrusion detection system.

US Market Grows with Backlogged Demand

US Market Grows with Backlogged Demand

Editor / Provider: a&s International | Updated: 8/16/2011 | Article type: Hot Topics

With increased cash flow, pent-up demand for security is rallying in 2011. Critical-infrastructure applications, as well as education projects, are going strong. In product adoption, IP smoothes the way for enhanced interoperability, indicating a good year to come.

US security demand reached a boiling point after the 9/11 terrorist attacks. Homeland security boomed, as states and municipalities rushed to secure citizens and critical infrastructure. The detection market for chemical, biological, radiological and nuclear and hazardous material decontamination technologies is expected to reach US$1.5 billion by 2016, according to the Homeland Security Research Corporation.

A need for a unified response drove access control demand. “Access control is growing in government, utilities and health care,” said Paul Everett, Research Director for Access Control, Fire and Security at IMS Research. “The government has federal Homeland Security Presidential Directive 12 and personal-identity verification mandates, which drive growth.”

Critical infrastructure continues to heat up, as the market rebounds from the economic downturn. US government installations are stringent about IT and will specify standards for hosted video and access control in the cloud, said Matt Barnette, VP of Sales and Marketing, AMAG Technology.

Rising Verticals
Transportation and City Surv eillance
The transportation market is witnessing strong growth as air and rail hubs remain on high alert. “Critical infrastructure is growing, such as for city surveillance, airport, transport and roads, seaports and railways,” said Kim Robbins, Director of Marketing Communications for DVTel. These verticals are sustained by continued grant funding to meet specifications.

State spending for intelligent transportation systems (ITS) was expected to reach $1.4 billion in 2010, said IMS Research. California and Florida lead in spending, with another 26 states increasing the scale of their ITS deployments by $10 million to $100 million each.

City surveillance is well underway in large US cities. “Just about every major metropolis is adding traffic cameras for analytics,” said Lance Holloway, Director of Technology Strategy, Stanley Convergent Security Solutions.

Analytics can speed up video searches, identifying objects as people or vehicles, as well as classifying colors. “More system integrators request real projects,” said Zvika Ashani, CTO of Agent Video Intelligence. “We see demand in critical infrastructure and city surveillance.” Integration of large camera deployments in critical infrastructure requires better integration, making PSIM providers hotly in demand. “It's why we acquired PSIM provider Rontal to expand our technology into critical infrastructure and the enterprise space,” said Courtney Jaret, Marketing Director for Verint Systems.

Adoption of PSIM is growing to streamline operations. “We have massive buildings and corporations spread across the U.S., making the addressable market enormous,” said Matthew Kushner, President of the Americas, CNL Software. “That has largely come about because of the economic tone. As more budgets are released, integration problems that haven't gone away since 2008 mean more demand for PSIM.”

End users look for fully integrated solutions. “Customers want to sit down in front of one software package and one interface to control their facility or multiple facilities,” Barnette said.

Comprehensive solutions need to deliver true value beyond equipment. “Users look for a full platform that can control heating and cooling, count people and monitor displays,” said Gadi Piran, President of On-Net Surveillance Systems.

However, America's large installation base of analog equipment is slowing network uptake. “The smart-city market outside the U.S. is massively larger,” said Steve Collen, Director of Business Development, Physical Security Business Unit, Cisco Systems. “Cisco has about 500 smart-city deals worldwide.”


Best in Class
Education has long been an early adopter of security, with good growth expected in the U.S. “Education is sadly seeing more uptake because of violence, bullying and vandalism,” said Steve Gorski, GM of the Americas, Mobotix. “If you think about schools, they have good network infrastructure, which lends itself to supporting network cameras.”

Higher education is seeing a change from the traditional security channel. Instead of going through installers, some end users are deploying network video surveillance themselves. A US university had its own IT security team install 500 cameras, heightening vigilance to crime or deliberate violence, such as shootings. “The university used video surveillance very effectively to deter and solve incidents on campus,” said Wendi Burke, Manager of Global Marketing Communications, IQinVision

A college deployed a solution combining a strobe, sensor and camera at its observatory, after the theft of a $2 million telescope. “The institution didn't secure the telescope because they thought it was too big to take,” said Rollie Trayte, President and COO of FutureSentry.

Cashing In
Gaming projects slowed during the recession, but are seeing renewed movement. “Gaming is big for us,” said Scott Paul, Senior Product Marketing Manager for Pelco (a Schneider Electric company). “We have a number of installations and reference sites around Las Vegas, including the Bellagio, the Mirage and McCarran Airport.”

HDcctv enables HD resolution over coaxial cables, which is suited for casinos betting on upgrades. This utilizes legacy wiring while covering key areas such as entrances or dealer tables with better detail. “The big benefit is that casinos don't need to change cabling over existing RG 59, and you don't need to rip apart the casino,” said Mark Wilson, VP of Marketing for Infinova.

“If you just change the cameras, that expense can come out of the maintenance budget.”
Retail has stabilized, as consumer spending increases.
“Retail is growing for wholesale chains with many stores and a central video system,” said Lars Gudbrandsson, Head of Product Management for Milestone Systems. “The U.S. is good at incorporating large installations and taking advantage of IP surveillance.”

Video surveillance can provide real ROI to retailers. “Wal-Mart saved millions of dollars on litigation from fraudulent slip-and-fall claims by being able to display detailed video of people deliberately pouring water or pretending to fall,” said Bengt Christensson, Senior Marketing Director for Ambarella.

A strong retrofit market in the Americas kept intrusion from declining too much as new construction slowed, according to IMS Research. More interactive systems are seeing uptake, such as video verification.

Cloud applications are particularly appealing, with several rollouts underway in the U.S. “The cloud is seeing movement for video verification,” said Jon Hughes, Product Marketing Manager for Video Surveillance, Interlogix (a UTC Fire & Security company). “We have third-party development partners.”

Slow economic conditions hastened adoption of easy-to-administer access control solutions such as software as a service (SaaS). “Greater emphasis has been placed on streamlining and reducing operational costs for security operations covering broad geographic deployments,” said IMS Research in an April report. “However, uptake will be modest until mainstream users identify the same benefits as niche users. One barrier limiting mass adoption is end-user reluctance to store security data on a third-party server rather than on-site.”

Migrating to IP
IP video has matured, with breakthroughs in resolution, compression and storage. While the technology is essentially unchanged from prerecession specifications, buyers now are actually able to pick up the tab.

“IP uptake is accelerating,” Gorski said. “We have had tremendous growth in the U.S., which is up 50 percent.” More cameras and DVRs are opening up to IP. “VARs from the IT world are now in security,” said Joe Cuellar, Sales for DNF Security.

One of the biggest draws of IP video is higherresolution imaging, with 2.1-megapixel resolution equaling that of six D1 cameras. All those extra pixels require a significant amount of storage, which is becoming more affordable. “The increases in the number of video channels per installation and the resolution of the cameras are some of the primary reasons for the growth of data in video surveillance applications,” wrote Frost & Sullivan in its 2010 “North American Physical Security Network Storage Market” report. “As end users weigh the benefits of expenditures for installation and implementation of updated and advanced technology against existing infrastructure, recovery in this sector is expected to begin in 2010.”

The value of network storage is also driving adoption in the U.S. “Falling prices and greater levels of innovation among the IP-based physical security systems are helping the shift to more IP-centric systems requiring networkbased storage,” Frost & Sullivan said. “Integrated security management offers huge potential for network storage systems in physical security. Security systems can be incorporated into enterprise databases to expedite business processes.”

Strategic partnerships are the way forward, as seen in Cisco Systems joining forces with Pelco for its network camera business. Pelco's acquisition by Schneider Electric furthered strengthened Cisco's ties, as it had worked extensively with Schneider on building projects. “What we see in the future of that relationship is much more than physical security; with building automation and access control, it's packaging all those things together,” Collen said. “I think the security market's a good one to be in, as it seems quite robust.”


ONVIF and PSIA are the dominant interoperability bodies, with PSIA being the first body formed during February 2008 in the U.S. PSIA is working on comprehensive standards for video surveillance, access control and intrusion, while ONVIF is more video-centric.

Today, ONVIF is the one with more members — 296 as of press time. “We have close to 800 products,” said Jonas Andersson, Chairman of ONVIF's Steering Committee and Director of Business Development and Global Sales at Axis Communications. “Consultants have started specifying the standard, which no one could imagine.” Each standard has its own merits. However, as most vendors specialize in video surveillance, they adopted the standard followed by network camera king Axis.

While both ONVIF and PSIA promise to address access control and intrusion, the first iteration of the standards covers getting video from third-party network cameras. Playback, compression and PTZ controls are not yet covered, as each company does things differently.

As end users mix and match cameras, interoperability standards relieve headaches. “Many customers have come to trust the quality and the performance of our products, and will be able to continue doing so as they use their VMS or NVR of choice,” said Steven Sung, Regional Sales Manager of CNB Technology. “We want to be an integral part of the process in making network cameras more available than ever.”

However, technical issues still need to be ironed out. “Real-time streaming protocol is not detailed enough in ONVIF, which is why some cameras display with better quality than others,” said Qiwei Zhang, Assistant Chief Engineer of SAE Electronic. “Equipment in the network is not detected if it goes offline, which is covered in the PSIA standard. We're leaning toward PSIA compliance, as it's a more complete standard.”

Each body has multiple levels of membership; fees are not charged for manufacturers conforming to the standard, while higher-level paying members are involved in writing the specifications. “ONVIF has achieved so much, and it's foolish to expect everything to be perfect from the start,” said Anders Ulle, Communications for Siemens Building Technologies.

“ONVIF doesn't test all devices; it's an honesty game.” The current version of ONVIF is incompatible with past versions, causing great developer consternation. “Future releases of the standard will be backward-compatible,” Andersson said. “We will just add to the standard, not modify it.”

However, each manufacturer will interpret the standard differently to maintain their competitive advantage, making true interoperability elusive. “I was the vice chair of PSIA and saw where the market was going,” said Danny Petkevich, VP of R&D for Next Level Security Systems. “Everyone was doing the same thing. Where the future is and where it is now is taking all the pieces, putting them together and making it easy for people.” Standards are in their infancy, but are a step in the right direction for a highly fragmented industry.

The American market has made an impressive rally in the past year, with fervent hopes that the worst of the downturn is over. Increased funding and healthy domestic demand are spurring an uptick for IP and solutions that deliver cost-saving results. US security is on the rebound, hoping to score big in 2011

Chemical Plant Secured by Siemens Surveillance Solution

Chemical Plant Secured by Siemens Surveillance Solution

Editor / Provider: Siemens Building Technologies | Updated: 8/5/2011 | Article type: Infrastructure

Chemical manufacturing facilities have always placed a high priority on public and environmental safety but today manufacturers must also now consider the threat of intrusion and attacks. Thanks to a management solution from Siemens Building Technologies Division, security procedures at a chemical manufacturing facility owned by PPG Industries are greatly enhanced.

Pittsburgh-based PPG is a global manufacturer and supplier of paints, coatings, optical products, specialty materials, chemicals, glass and fiber glass. Serving customers in construction, consumer products, industrial and transportation markets, it operates on the leading edge of new technologies and solutions. The company operates in more than 60 countries around the globe.

PPG reviewed the surveillance system at one of its largest and uniquely located sites. While the system recorded activity 24 hours a day, accurate real-time surveillance was limited to periods when security guards watched video-feed without interruption. It was a relatively simple matter to realize that the software intelligence built into the solution from Siemens Building Technologies Division, would enhance protection of the site, with the additional benefit of simultaneously reducing surveillance costs.

The Siemens solution is an automated large-scale video surveillance solution that transforms traditional physical security systems by combining camera and other sensor (intrusion, fire detection, access control etc.) input. It provides reliable protection for industrial facilities, transportation hubs and byways such as seaports and airports, water treatment facilities and other critical infrastructure by continuously monitoring sites through intelligent policy zones and virtual barriers even across water. It detects, tracks, and classifies activity in real time, filtering critical events from camera and other sensor input, displaying the results on a comprehensive digital map of the entire site on a single screen. This enables operators to see exactly what is happening at any time throughout the whole site. Integrated 3-D analytics determine object attributes in absolute “real-world“ coordinates. This requires fewer cameras and helps lower infrastructure cost compared to 2-D analytics.

At the PPG site, the software-driven nerve center of the solution takes input from many cameras and provides a live, bird's-eye view of the entire manufacturing facility, spanning more than 1,000 acres and including a mile of shoreline as well as railway entry and exit points. This composite view takes the guesswork out of tracking objects that move from camera to camera, so operators always know the accurate location of every object in the facility.Detailed information about anything suspicious is readily available.

The perimeter and other sensitive areas are protected by ‘Alert' zones. This automated triggering of instantaneous alerts substantially reduces the cost of monitoring, giving around-the-clock protection. When anything unexpected occurs, the solution automatically detects any activity, pinpoints the location and tracks the perpetrators whilst simultaneously alerting guards through audio, video notifications, and e-mail alerts. This ability to efficiently deploy guards rapidly and efficiently helps prevent the escalation of incidents. Alerts are triggered from changes as simple as a vehicle or an individual entering a restricted area, but can also be triggered by object speed or size. Alert areas are easily and instantly set or changed by dragging area boundaries in the composite image of the site and can be adjusted using preset shortcuts. The open architecture enables the solution to run on standard hardware and software and allows it to be modified and expanded to respond to changing security needs. It easily accommodates site-specific operational conditions and varying security requirements allowing the limiting of access to selected areas or the entire site, the specification of varying security level requirements within the site and the raising or lowering of security levels in accordance with threat levels or evolving governmental mandates.

Planning and implementation of the system at the PPG site was assisted by the skill of Siemens staff and the solution was delivered ahead of schedule. This gave security personnel at PPG time to get practical, hands-on experience before the system went live and after just a single day of training, operators were using the system successfully.

Troy Higginbotham, Senior Tech Analyst of PPG, said, "I have been working with Siemens' surveillance software since 2003. In my opinion, the latest  version is the best upgrade since its inception. The ability to track a single object with multiple interrogation cameras and auto-zoom to a factor based on how far the object is from that camera is very impressive.

Higginbotham continued, "I have had the opportunity to work with the system for a few hours in order to re-acquaint myself and the advances made have amazed me. Siemens' professional services team, along with the technical support team, has done everything needed to make this project a successful upgrade"

Shortly after the Siemens' solution was operational, a mock attack was staged with actors portraying terrorists. Operators tracked, monitored, and recorded the progress of the ‘intruders' by vessel and on foot, via the screen image of the site. Never before had security officials at the site been able to detect and monitor a potential threat to their facility so effectively. They then dispatched guards to their exact locations.

The Siemens solution has now become the foundation of the security program at the site because it seamlessly integrates new and existing sensor types and allows the client to manage all surveillance-related security issues easily from a single point.

Sky is the Limit: Airport Security Soaring into Smart Management

Sky is the Limit: Airport Security Soaring into Smart Management

Editor / Provider: Camille Shieh | Updated: 7/4/2011 | Article type: Infrastructure

Heightened aviation security since the 9/11 attacks and subsequent terrorist threats has brought along increased awareness, for danger can be detected or deterred before brought into the air.

As new airports continue to be constructed and existing ones upgraded, newer technologies like HD video surveillance, video content analysis and management software are gradually adopted to enhance the security and safety of complex airport and aviation operations. Security management of the entire premises is, thus, increasingly highlighted. One of the top challenges faced by system integrators today is assimilating new technologies and products into existing systems, as old and new systems often have trouble communicating with one another. However, should an airport project adopt technologies based on an open platform, integration would be much smoother, with extra cost minimized and existing investment extended.

It is common to find restaurants, retail shops, cafes — and even hotels, spa centers and casinos — in today's airports. “As airports provide a global transportation network among cities, they are important hubs and have considerable regional economic significance, giving the cities they serve great commercial advantages over those that do not have them,” said Uwe Karl, Head of Airport Solutions, Siemens Building Technologies. “Airports will undoubtedly continue to grow in number, and existing airports will continue to grow in size in order to satisfy the increasing demand for mobility. The systems employed to protect them, therefore, need to accommodate such growth, with a smooth migration path to allow systems to expand easily.”

Newer, Bigger, Better
The mature markets in North America and Western Europe see a continuation of security upgrades. “The sales outlook is promising as threat has not lessened,” said Mark Wilson, VP of Marketing, Infinova. “The biggest need requested by airports in North America is HD video surveillance.”

The US market is continuing at a good pace, fueled by the events of 9/11 and carried through up until the Obama administration, said Mark Moscinski, VP of Safety and Security, System Development Integration. “Federal stimulus funding has also kicked in for many airport security projects with design phases giving way to implementation projects; in fact, we seem to be only at a halfway point through the federal funds for the realization of our current projects.” In the last few years, large airports in Europe have had more difficulty with growth than smaller airports, and this trend will continue in the next five years, said Arjan Bouter, International Sales Manager at Nedap. “In Europe, large airports are looking for more flexible solutions to curb the impact of disruptions by extreme weather conditions and other disasters.”

Newer airports in the Middle East and Asia will also challenge the European ones, Bouter continued. “Obviously, this will have an effect on security management systems; new safety and security platforms will contribute to a lower TCO that improves the competitveness of European airports.”

New and upgrade projects in emerging markets, such as China, India, Southeast Asia, Eastern Europe, Russia and Latin America, see healthy growth in number. “We recently completed a project for 22 airports in India, in addition to other major projects in Easter Europe and the Middle East,” Wilson said. “For these projects, we used a combination of analog and HD cameras, and in many cases, they are taking advantage of the existing fiber optics.”

These regions are characterized by strong expansion. For instance, China has planned over the next five years 55 new airports to cover the expansion of traffic, Bouter added. “These regions will implement new security platforms, often based on open standards.”

Many airports in these regions are also undergoing a “face-lift,” and usually for these projects, HD and megapixel technologies are sought after in conjunction with advanced software like video content analysis (VCA), said Aluisio Figueiredo, COO of Intelligent Security Systems. Overall, the physical security market for airports is expected to double by 2016, said Julian Harris, Research Analyst for Aerospace and Defense in North America, Frost & Sullivan. “Perimeter security is growing significantly due to technology innovation and the push to protect patron safety. We see fiber-optic fencing experience more growth than traditional fencing, as the former continues to be invested in.”

In video surveillance, Harris sees more IP surveillance installed at larger international airports, while smaller airports opt for analog technology with less integration of disparate security systems. “In terms of access control, fingerprint readers tend to be adopted by larger airports, while smaller airports stick to standard access control protocol, suggesting that larger airports are exploring more options.”

Biometrics will continue to play an increasingly crucial role, agreed Scott Mahnken, VP of Marketing, Bio-Key International. “Convenience and security are paramount in airports, and biometrics are virtually impossible to corrupt yet involve no cards, passwords or tangible assets. Documents may be forgotten, but we will always have our fingerprints or other biometric attributes.”


Government In volvement
As most airports are state-owned, municipal, state and federal governments are crucial players in determining what security measures need to be set up in airports. “There is a maze of security and regulatory issues facing every airport,” said John Diedam, VP of International Sales, Ingersoll Rand Security Technologies. “It starts with a thorough understanding of Title 49 CFR Part 1542 of the US Homeland Security's Transportation Department, ranging from who must be in charge, how to become compliant and airport tenant security programs, to security of various locations within the airport, law enforcement and access control. The first objective is to reduce the complexity of this and all other pertaining regulations, along with the security ramifications.”

Next, one needs to determine and resolve airport security and fire safety vulnerabilities, Diedam continued. “Security could be almost perfect if everything was locked down and nobody could come or go, but that's not feasible. What needs to be done is to assure that security is at a high level but innocents can escape when needed. There's a compromise, and they are typically found within the regulations aforementioned and local codes and regulations.”

In the U.S., every commercial airport is owned and operated by a local government entity — city, county, state or port authority — each with its own political structure, funding capabilities, environmental/noise requirements and security/law enforcement support, said Art Kosatka, CEO of TranSecure (a member of the Association of Independent Aviation Security Professionals). “There are federal regulations, as well as state and local building and electrical codes and fire and life safety codes, which must be met.”

“We often see that local or state governments are strongly involved in the economic development of the region/country where the airport is situated,” Bouter said. “Under such circumstance, local solution providers are often favored to take on new or upgrade projects.”

Airports are used as hubs to create new business in many places, observed Gerard Otterspeer, Product Marketing Manager for CCTV, Bosch Security Systems. “At times, international consultants such as ADPI, COWI-Larsen, Bechtel and Parsons set the security standards in airport projects while they help clients plan and design aviation construction projects.”

New ≠ Best
While there are strict and high security requirements, not all airport projects use the latest technologies the security industry has to offer. “Airport clients are very savvy customers, knowing what they need and insisting that their integrators and manufacturers provide systems that meet their expectations for both performance and budget,” Wilson said. “With even new construction projects, it is not unusual to see analog video implanted in areas where it sufficiently does the job. In fact, there are many hybrid and coexisting systems at airports.”

“Airports focus on leveraging as much of their existing technology as possible; they do not have a rip-andreplace mentality,” said James Chong, CTO of VidSys. “Additionally, they tend to wait to use new technology until it has been proven in the marketplace.”

“Generally, we like to think in terms of first providing an initial concept of operations (ConOps) for the customer — what are you doing, why do you need it, where is it required, what is the threat you are addressing and what are the priorities,” Kosatka said. “This should drive the technology decisions, one of which might be that new technology in consideration isn't right for the airport's actual needs at all.”

Securing airports is a complex undertaking, remarked Larry Lien, VP of Product Management at Proximex (an ADT Security Services company). “Airports are continuously looking for ways to improve ConOps to best protect passengers and employees, as well as avoid poor publicity and lost revenue from security incidents. Some airports leverage the latest technologies to fit specific project requirements. They evaluate many factors to make the decisions, including the benefits, risk factors, costs and ROI for new technologies. Newer technologies, such as HD cameras, offer significant advantages because airports may leverage fewer cameras but still cover a large area. However, airports must still consider the ability of newer technologies to communicate with existing systems and fit within the ConOps.”

In airport projects, proven brands, solutions and products are preferred, while current technologies are followed in a general fashion, Otterspeer observed. “HD and even full HD products have gained popularity in this kind of projects for applications like forensic search and wide-angle viewing; however, during the course of a project, the technologies used can change.” Technologies used are much influenced by the consultants in many cases.


HD and VCA
Using HD video streaming can help extend the life of the existing analog cabling of an airport surveillance system while providing better forensic evidence and the zero latency needed for live monitoring using PTZ camera controls, Wilson Vertical Market said.

In airport security, the devil is indeed in the details. “HD delivers a wide-screen format that captures more useable image content, reducing the amount of empty sky or foreground in a scene if a wide-viewing angle is needed, such as at baggage claim areas,” Otterspeer said.

Motion sensor technology has certainly improved and can now detect farther and more precisely than previous versions, said Rolland Trayte, President of FutureSentry. “Solar-powered wireless sensors offer simple installation and add the detection range to 1,000 feet. Advanced applications can also add analytics to further ensure robust detection and reliability of alarming inputs, and enable the system to ‘learn' the difference between uniquely shaped objects.”

Adoption of VCA for airport monitoring remains low, despite a visible growth in the last couple of years. “VCA is used in about less than 10 percent of airport projects currently, with potential to grow moderately to 15 to 20 percent in the next few years,” Harris said.

“Security standards are not in place yet to get this widely adopted in the market.” Actual applications, Otterspeer added, include line crossings for external perimeters and wrong-way or loitering detection for strategic locations such as air traffic control towers, customs gates and aircraft ramps. “VCA is used from site to site, depending on what the project requirements are,” Moscinski said. “Currently, simple analytics are used most often, as the technology still has several barriers to overcome, such as unsatisfactory hit ratios and high FARs. Simple VCA like motion and object detection can help identify when someone has crossed checkpoints from the nonsecurity to the security side, alarm relevant personnel and provide evidence to assist with tracking and identifying the intruder. We see the most active VCA evaluation now taking place for use in perimeter security.”

Another key technology identified is ALPR, which is very common these days at Tier-1 (major) airports and is becoming increasingly common at Tier-2 and even some Tier-3 airports, said Jim Kennedy, President of Inex/Zamir. “The primary use is for parking revenue management to prevent ticketswapping fraud and subsequent revenue losses. Increasingly, we are requested to provide a ‘list-matching' capability to our system so that local authorities can be immediately notified if a vehicle that is on a watch list enters a specific parking facility.” The disappointment with VCA often stems from undelivered functions it promised in the beginning, Figueiredo said. “Many vendors are pushing less-than-ready VCA products out to customers to make quick cash even if the technology is still not mature enough for real-life usage, ultimately creating more problems for customers. The accuracy of VCA reading is, on average, 85 percent or better when utilized in a controlled environment with strategic camera position and correct lighting.”

HD, megapixel cameras and video analytics may provide improved inf o rma t i on and s i tua t i ona l awareness, but they introduce enormous operational costs in terms of bandwidth and storage requirements, and other issues such as forensic capability and privacy.


Drawing Together
In expansion projects, such as a midsize, domestic airport scaling to large, international airport or a large-scale airport expanding current facilities, new security systems and technologies, such as HD video, IP-based video and VCA, are often introduced. “These new technologies cannot be installed independently of other existing security systems and require shared information,” Lien said. “Security operators must use different consoles and different systems to manage incidents. The costs associated with operating independent and nonintegrated systems, such as training, additional skills required for reporting and longer incident response time, are significant.”

Yet connecting disparate systems under one central command is no easy task. “We face a lot of problems with legacy systems,” Figueiredo said. “Sometimes, there is no documentation, no SDK, or the company responsible for the system simply went out of business. System integrators (SIs) like us basically have to make sure that the systems work together through the use of an open-platform approach.”

“Typically, each installer/integrator is focused on making sure its own system is installed and runs correctly,” Lien added. “Expectations of how to integrate and what an integrated system can realistically accomplish could often be miscommunicated. Entities that require communication between systems should find an experienced SI that can help them set clearly defined goals for their environments.”

For security purposes, central management software like physical security information management (PSIM) is a good way to maintain unified control over different systems in operation. “A true PSIM solution enables one complete and intelligent security system by aggregating information from various subsystems and automating processes as appropriate to effectively manage situations,” Chong said.

PSIM software is a good option whenever doing a significant expansion or a new project, added Joshua Koopferstock, Director of Marketing, Feeling Software. “Multiple systems, mapping and SOPs should be combined within a single software package, and this common operating picture in airports is becoming increasingly important as security systems become bigger and more complex as the facility expands in size.” To facilitate smooth integration of hardware and software, as well as the old and the new, adopting an open approach that grants partners with access to their SDKs and APIs is vital, Koopferstock said.

“Oftentimes, SIs and PSIM vendors combine their knowledge of and expertise in physical security technologies, process management, and security policy and compliance to provide organizations with a complete situational awareness and management solution,” Chong said.

In addition, SIs and airports should work together to consider their ConOps and how the systems should function after integration, Lien remarked. “Understanding process flows, automating tasks, correlating information and giving usable information to operators will help airports optimize their operations and realize cost savings.”

Many are now focused on quickly identifying situations and disseminating the information to the guards, police and other necessary agencies in real time, Chong said. “Airports are also starting to use a single security asset, such as a camera, for multiple uses. For example, security may use a camera to see if someone is walking around the runway, while air side operations may use the same camera to verify if the gate is available for an arriving flight.”

The growing complexity of daily airport operations demands equally diversified security systems. Smoothly integrated systems, such as access control and people tracking, will help with the fluidity of security management on aviation premises. Biometrics, the new kid on the block for airport access control and ID authentication, will be explored next.

Geutebruck Video System Supports Security at Ljubljana Airport

Geutebruck Video System Supports Security at Ljubljana Airport

Editor / Provider: Geutebrück | Updated: 7/7/2011 | Article type: Infrastructure

Aerodrom Ljubljana which operates Joze Pucnik Ljubljana Airport has long term plans for it to become the aviation hub for the whole region. With Slovenia's entry into the EU and admission to Schengen in 2007 came the need to increase airport capacity. In the first stage of a two-stage project, the existing passenger terminal (T1) has been renovated and a whole new 6,000 square metre storey added. The extra space together with four new jetways now facilitate the separation of Schengen and non-Schengen traffic and make boarding easier. Part 2 of the project due to start in 2011 involves the construction of a new T2 terminal adjoining T1 to provide capacity for a further 2.5 million passengers per year. 

In fact piece by piece over the last two decades the airport has been completely rebuilt. And with each new construction project the security systems have had to expand and develop. The airport's chosen video security system supplier for the original T1 building, the new garage and outdoor car parks as well as for the recent T1 renovation and additional storey was Geutebruck Adria. This business relationship has now been a long and satisfactory one. 

Technological migration
Since 2006 all new additions to the video security systems have been pure IP. Around 100 new IQeye IP cameras and Axis IP SpeedDome cameras now work alongside the original 160 analog ones. Late in 2008 some new powerful GeViScope video platforms were introduced. Besides increased performance these also brought exceptional video motion detection capabilities and enormous flexibility for future adaptation. In 2009/10 the need to relocate the control room to a new building provided the ideal opportunity to upgrade its facilities. The old analog matrix and analog monitor wall were replaced with a virtual digital matrix and an array of wide plasma monitors.

From the new security operations center staff monitor the whole site. They control the entrances to the airport, the car parking facilities, areas in and around the general aviation and passenger terminals, the VIP areas, the apron and runways.They alert colleagues ‘on the ground' to parking violations, loitering and other suspicious behaviour as well as unattended baggage. Their monitoring also ensures that pick-pockets or other small time criminals are not tempted to take advantage of unsuspecting travellers amid the hustle and bustle. The integration of the video system with the airport's access control system is key to the strict control of movements through the doors and gates which form the crucial air-side/land-side interface. Air-side cameras allow security operations center staff to check that the apron and runways remain unobstructed, safe and secure, and of course enable them to alert and manage emergency or other services if required. 

System selection
Before the contract was awarded for the most recent T1 terminal expansion the airport authority evaluated and compared video security solutions from three major European suppliers. As Dusan Sofric,Ljubljana airport's security manager reports, the Geutebruck equipment was chosen because of its performance and proven reliability. 

This latest GeViScope-based system which uses GscView display software and MBeg control units was designed by Koda and Siemens and installed by PAN electronic and G7. “It is very reliable and easy to use” explains Dusan Sofric. “It is operated by staff in security operations center who have had basic training on GscView.The system has performed very well, exactly as it was initially demonstrated to us.”

Memoori: Will Economic Setbacks Reduce Business Opportunities in the Security Industry?

Memoori: Will Economic Setbacks Reduce Business Opportunities in the Security Industry?

Editor / Provider: Submitted by Memoori Business Intelligence | Updated: 6/8/2011 | Article type: Hot Topics

This time last year economic indicators took a hit with major concerns about the need for countries within the Euro Zone to cut back on public expenditure; in order to repay their massive debts. While this did have an effect on demand for security equipment it was marginal and the fragile recovery in the economy has limped on in the last nine months. But recent events in Greece, Portugal and Ireland would suggest that the bail outs have not worked and they are likely to default on the loan repayments. This has both extinguished any recovery in these markets and has taken its toll in other weak economies in Europe. It will have an adverse impact on world trade. Stock markets across the world have significantly marked down share prices and the buoyant forecasts of economic growth made some five months ago are being revised.

However the emerging markets of China, India and Brazil have so far not been affected. For some years financial markets have turned tail at the mere hint of bad news and have exaggerated the possible consequences; but by the same token the upswing also responds as rapidly. The facts and statistics shown in this month's do not flag up any serious adverse trends that will reduce the opportunity to grow the security business in the near term of the next six months, but they do suggest that there is less confidence and a hint of caution in the air.

Our figures for the first quarter of this year showed that consolidation had slowed down with the number of acquisitions down by 20 percent on the same period of 2010. The last two months have seen a significant recovery, Tyco Fire and Security claim they are about to close a US$110 million deal, there is serious talk about Securitas and Niscayah making a reunion and the possibility that Cisco will put Linksys on the block reach fruition, then we will be on track to beat the 2010 record for value of deals exceeding $7.98 billion.

Investment for the first five months of the year is marginally up on the same period of 2010 but much of this is the result of arranging new lines of credit. There appears to be little change in the area of venture capital funding.

The most encouraging feature of the business is reflected in the financial performance of security players. The fourth quarter 2010 and first quarter 2011 financial announcements made recently show for the most part revenues and profitability well up on the same quarter of 2010; and the full year outperforming 2009. With almost all anticipating improved trading conditions in 2011, it looks as though revenues and profitability will improve on 2010.

The star performers in 2010 include Axis Communications, Mobotix, Basler, Authentec and Bio-Key, despite the fact that their fourth quarter was well down on 2009. These companies are very specialist and perform in the high growth areas of the business and / or strong in geographic markets that performed well in 2010. They are all companies that spend on product development in the high-tech areas of IP networking.

Similarly the world's major security companies such as Tyco, Honeywell Security, Schneider Electric and Siemens Security Systems all increased both profitability and growth, they are bullish about 2011. Cooper Industries and Ingersoll Rand likewise also increased their growth and profitability, while Bosch Security Systems returned to profitability on increased sales.

With trading conditions looking buoyant in some geographic regions and the drivers that accelerated consolidation and investment in 2010 still well in place that the slowdown of acquisitions and stagnation in funding in the first five months of 2011 does not indicate in anyway a correction but is just a short-term deviation. One major acquisition would bring consolidation well back on track.

So despite economic setbacks it's expected the market to continue to flourish in the high-technology areas of the security business particularly where IT convergence can deliver better ROI. Working the emerging markets and the US with emphasis on some vertical markets will produce the best results while mainstream and low-tech business will continue to reduce its share of the business.

For more information, please go visit Memoori.

Advanced Access Control Helps With Real-Life Management and Processes

Advanced Access Control Helps With Real-Life Management and Processes

Editor / Provider: Submitted by HID Global, Siemens Building Technologies, CEM Systems and UTC Fire & Security | Updated: 6/1/2011 | Article type: Commercial Markets

Access control not only monitors the entrance and exit of a facility but ties in closely with payroll and time and attendance, enhancing total people and process management.

Albert Einstein Health Care Network Stays Connected Through HID Global
Albert Einstein Health Care Network (AEHN) in Philadelphia, U.S. is a large health care system that comprises four hospitals, seven campuses and about 50 off-site primary care physician and surgical center locations. The medical center and its network host 1,200 beds, 6,000 employees, 1,200 staff and voluntary physicians, 10,000 visitors per day and more than 100,000 emergency room patients per year. The health care system needed to replace the employees', doctors', volunteers' and other medical staff's badges with ID smart cards featuring the network's new logo while integrating its payroll system into the new badges.

For this project, AEHN selected HID's readers, smart cards and badge personalization service to replace the 300 existing swipe card readers and produce 7,000 new personalized smart card badges. To ensure a seamless transition for employees, HID offered dual-technology smart cards that worked on both existing and new systems.

HID's badge personalization service printed 50 cards that were tested over two payroll cycles before formal adoption to guarantee that AEHN's payroll system worked accurately and flawlessly with the smart cards.

Once it confirmed the payroll and ID cards were fully integrated, AEHN provided a database of employees and their photos so the badges could be printed and encoded off-site at the card production facility. Within four weeks, AEHN had 7,000 newly branded badges incorporating the new technology.

Since adoption of the new smart-card badges, other departments have integrated other functions, including single sign-ons to computers, AEHN information security enhancement, and cashless vending, integrating cafeteria and vending systems to work with the payroll system.

Future plans for the multiapplication platform include tracking employees' mandatory vaccinations and adding credentials of physicians for visiting doctors in case of a disaster. Down the road, AEHN is hoping to integrate access control cards with medical records and patient information as well.


Siemens Building Technologies Provides Better Health for Hospitals
Drastic budget cuts, aging populations and increasing patient demands present enormous challenges to hospitals around the globe — many facilities have already closed down. In Germany, for example, the number of hospitals has decreased by 10 percent to around 2,100 in just a decade. The German Hospital Association does not anticipate a reversal of this trend.

The Building Technologies (BT) division of Siemens helps hospitals address these challenges with smart and energy-efficient solutions, coupled with sophisticated security systems. BT's portfolio includes fire detection and extinguishing, security, low-voltage power distribution, building automation, energy efficiency solutions and energy management contracting. Siemens provides financing for energy-saving measures, guarantees customers preset yearly energy savings, and allows them to repay their investments from the money saved.

A case in point was the “Hospital of the 21st Century” which opened in early 2009 in Sittard, the Netherlands where patients are treated as guests and efficiency measures extend beyond cost reduction to enhance patient well-being and rapid healing. At the Orbis Medisch Centrum, advanced Siemens technologies contribute to outstanding patient care while reducing health care costs by around 10 percent.

Hospital security and fire safety were additional key issues. BT's RFID system ensures the security of personnel. In case of emergency, staff can trigger an alarm through the RFID tag integrated in their personal badge, which is forwarded to the personnel in charge through a wireless tracking system.

Additionally, Siemens installed an innovative fire safety system consisting of detection, evacuation and extinguishing components. It is mapped in a danger management system in the hospital's command center so that in an emergency, patients, visitors and personnel can be directed to safety using visual indicators and loudspeaker announcements.


Access to Edinburgh's Spire Shawfair Park Hospital Protected by CEM Systems
CEM Systems' security management system was installed by ADT Glasgow in Edinburgh's new Spire Shawfair Park Hospital to secure patients, visitors and the state-of-the-art medical equipment at the hospital. The system provides the hospital with an integrated access control, alarm-processing and photo-badging arrangement.

Spire Shawfair Park Hospital is a new hospital in the east of Scotland and is part of Spire Healthcare — a leading provider of private health care with 36 hospitals throughout the U.K., employing 7,600 individuals and treating more than 930,000 patients a year. As a new modern hospital facility with the latest medical equipment, Spire Shawfair Park Hospital provides a range of private day care services to patients across Scotland.

The management software comes with many security applications, with Spire Shawfair Park Hospital particularly favoring the ID-badging application. The ID-badging application allows the hospital to print and design its own personalized access cards, while providing the ability to divide card holders into access groups, including day surgery, X-ray, accident and emergency, and hospital porters. This ensures only authorized individuals have access to certain areas.

The software also includes the alarm event display (AED) application. AED responds to all alarm situations in real time, providing a dynamic on-screen interface to external systems such as surveillance. Spire Shawfair Park Hospital can use this application to alert security personnel if an alarm is triggered or a door forced. Security at the hospital can act on this alarm immediately to ensure staff and patients are kept safe, and restricted areas are kept secure.

With the management system successfully installed, Spire Shawfair Park Hospital now has secure entrance points, where smart card technology ID badges are issued to control accessible and inaccessible areas in the facility.


GE HealthCare Selects UTC Fire & Security for Integrated Security Access
GE Healthcare provides transformational medical technologies and services through medical imaging and information technologies, medical diagnostics, patient-monitoring systems, performance improvement, drug discovery and biopharmaceutical manufacturing. Headquartered in the U.K., GE Healthcare employs more than 46,000 people worldwide committed to serving health care professionals and their patients in more than 100 countries.

GE Healthcare's main facility in Italy, covering 6,920 square meters over four floors with 430 employees, was moved into a new building. This building was in need of tighter security matching GE's global security outlook. Looking at the security approach of GE's facilities around the world, there was a specific need to expand the current system with integrated access control and video surveillance. GE Healthcare turned to UTC Fire & Security to provide the solution.

GE Healthcare's new security system is based on UTC Fire & Security's integrated security platform. This enables significant integration between access control, video surveillance and other building management systems. The Italian headquarters building is equipped with 40 strategically placed day/night cameras connected to three DVRs, 14 door readers and 50 magnetic door locks. The magnetic door locks in combination with badge readers control the opening and closing of doors and act as a basic intrusion detection system, triggering alarms when doors are forced or opened without authorization.

The integrated security system links access control and video surveillance, making it possible to crossmatch events. As a result, when a specific action occurs a door is opened, forced or access is denied — the video footage of that event is stored automatically on one of the DVRs. The main server in the central control room also manages identical security systems in GE Healthcare's local offices in Rome, Bologna, Turin, Naples and Mestre. With this system, no unauthorized action goes undetected, enabling business operations in a secure environment.

Security Industry Dynamics: April Came in with a Roar but Went out with a Whimper

Security Industry Dynamics: April Came in with a Roar but Went out with a Whimper

Editor / Provider: Submitted by Memoori Business Intelligence | Updated: 5/5/2011 | Article type: Hot Topics

The first quarter results analyzed on Memoori, a site providing information involved in security industry, entitled “The Physical Security Industry in 15 Minutes” showed that both consolidation and investment had slowed down significantly. In the first quarter of this year the number of acquisitions was 20-percent down on the same period of 2010 when Tyco made a US$2 billion acquisition of Broadview Security.

This was a disappointing start to 2011, but Reuters broke the news that Schneider Electric was mulling the possibility of acquiring Tyco International. This startling news opened up the possibility of realizing a $30-billion deal, by far the biggest ever in this industry; having major implications particularly for the other suppliers in the distribution chain.

Within days every analyst and pundit had reviewed the implications from all angles most commenting that this daring strategy could work but that it was risky. Schneider quelled speculation that the company was exploring acquiring Tyco International, saying it prefers smaller deals and that there would be no large scale transaction in 2011.

There can be no doubt that Schneider had been taking a serious look at this potential acquisition but the shareholders and financial community did not like it and the board have been forced to call a halt. The risk is that this acquisition would have stretched their finances too far, which overruled the strategic benefits of driving their security business to the top of the league while at the same time providing them with a global market leading fire safety business. Both of these businesses have proved to be robust and have grown during the world recession.

So strategically this is an opportunity lost, for Tyco would fit in well with Schneider's existing security / safety structure. There is no duplication with Tyco's Fire Detection & Extinguishing business and surprisingly little overlap with their physical security business. Schneider's strength is in the video camera surveillance market in the commercial sector acquired through its purchase of Pelco in 2008 and has a strong business in systems integration through a number of acquisitions that made up Tour Andover Controls. Tyco through the ADT operation is strongest in the residential market and Schneider does not play in that market apart from low-voltage equipment.

The residential market for security is expected to play a major role in bringing together home area networks, energy management and its interface with the automatic metering infrastructure a rapidly growing part of the smart grid. This new business would offer very significant longer term prospects for organic growth.

[NextPage]Had Tyco come into play then it is highly likely that Schneider would have had to fight off Honeywell Security, Siemens Building Technologies and UTC Fire & Security, but all of these companies have a major overlap in both fire and security. While that does not obviously rule them out they would need to divest a significant part of this business in order to make the acquisition commercially viable. The deal would therefore be less attractive to them. In addition, Honeywell and Siemens would have been scrutinized by the European Commission with regard to market share implications in the fire detection market.

It would appear that Tyco would not be adverse to a merger or acquisition so expect more rumors in the next nine months.

There were no major deals this month but Tyco (ADT Security) scored again with the purchase of Proximex, a PSIM supplier; following last month's purchase of Signature Security which they purchased from Oceania Capital Partners Limited for $171 million.

April recorded two major investments, but as always alliance arrangements continued to be buoyant with some nine identified, bringing the total number to 33 for the first four months of this year.

The most encouraging feature of the business is reflected in the financial performance of security players. The fourth quarter 2010 and first quarter 2011 financial announcements made recently show for the most part revenues and profitability well up on the same quarter of 2010 and the full year outperforming 2009. With almost all anticipating improved trading conditions in 2011, it looks as though revenues and profitability will improve on 2010.

The star performers in 2010 include Axis Communications, Mobotix, Basler, China Security & Surveillance, Authentec and Bio-Key, despite the fact that their fourth quarter was well down on 2009. These companies are very specialist and perform in the high growth areas of the business and / or strong in geographic markets that performed well in 2010.

Tyco, Honeywell and Siemens all increased both profitability and growth and are bullish about 2011. Cooper and Ingersoll Rand similarly increased their growth and profitability, whist Bosch Security Systems returned to profitability on increased sales.

With trading conditions looking buoyant and the drivers that accelerated consolidation and investment in 2010 still well in place we expect that the slowdown of acquisitions and funding in the first four months of 2011 does not indicate in anyway a correction but is just a short term deviation and 1 major acquisition would bring consolidation well back on course.

First Page< Prev< | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 >Next >Last Page