Click here to open
Autumn 2016 Interactive Showcase
Featured in this issue:
Access Control Video Storage Surveillance Systems Firefighting Foam
Thermal Imaging Cameras Rescue Equipment Fire & Smoke Barrier Systems Fire & Gas Detection Systems Fire & Security Software
Autumn 2016
Welcome to this edition of the SME/FME Interactive Showcase. Click, explore and learn about some of the best security and fire prevention innovations to help your business stay safe!
Solberg
Firefighting Foam
Intersec 2017
Evac+Chair
Coopers Fire
Flir
International Exhibitions
Ateis Hochiki
Cova Tyco Entrust
Pelco Geutebruck Vicon WatchNet
Resolver Bolster Systems
BCDVideo
Rescue Equipment
Thermal Imaging
Fire & Smoke Barrier Systems
Fire & Gas Detection Systems
Surveillance Systems
Fire & Security Software
Access Control
Video Storage
Visit www.bcdvideo.com/networking/titan-networking
Avaya technology is a perfect complement to BCDVideo’s IP video systems, delivering superior performance and simplicity to IP video surveillance customers. The series eliminates the complexity associated with multicast and substitutes it with very simple end point provisioning with only two lines of command. Customers who deploy BCDVideo systems and networking find that setup is uncomplicated. The solution delivers consistent availability, no matter how many systems are connected. The Titan Series is covered by a 24/7, five-year hardware and telephone support warranty. For more information visit www.bcdvideo.com/networking/titan-networking/
BCDVideo’s Titan Networking Series utilizes Avaya Fabric Connect to offer a simpler way. Fundamentally different from complex and static IP networks, Fabric Connect enables a dynamic, agile, and resilient network where services can be deployed at the edge only. Customers can streamline their network, eliminate legacy protocols (Spanning Tree and any PIM-based protocol,) and enable IP routing.
IP-based video products are overtaking analog-based video products. However, the majority of networks rely on antiquated protocols – resulting in long camera re-convergence times and scalability restrictions. IP multicast routing relies on Protocol Independent Multicast (PIM) being enabled on all devices throughout the network which is complex, cumbersome, and limited. New deployments can take weeks to implement.
According to ZK Research, 75% of video surveillance issues are attributed to the underlying network. Most of these issues have been found to be improper network support. The only option available to the video surveillance industry was expensive, complicated, and in many cases, low-performing multicast networking systems. Traditionally, a certified networking technician would be required to setup the network. BCDVideo and Avaya are delivering superior performance and simplicity to IP video security. Network performance is critical to any IP video surveillance system, the full performance video surveillance technology is realized with BCDVideo’s Titan Networking Series, powered by Avaya.
Contents
Next
Intersec 2017 is held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, and officially supported by the Dubai Police, Dubai Civil Defence, and the Dubai Police Academy. The 19th edition of the annual showpiece takes place from 22-24 January 2017 at the Dubai International Convention and Exhibition Centre. More information is available at: www.intersecexpo.com.
4
Intersec’s commanding presence on the international stage is reinforced by 83 per cent of exhibitors coming from outside the UAE, while visitors from as far afield as the USA and Brazil, to Australia or Switzerland, choose it as their preferred business networking platform. “From humble beginnings in 1999, when it featured just 61 exhibitors, Intersec has developed into a global powerhouse,” said Ahmed Pauwels, CEO of Intersec’s organiser, Messe Frankfurt Middle East. “There is no security, safety, and fire protection trade show anywhere in the world with such a diverse international mix of exhibitors and visitors.”
3
The double-digit growth that Intersec has enjoyed over the last five years has underlined its crucial role in the future development of not only the Middle East and Africa’s security, safety, and fire protection sectors, but beyond.In 2016, the annual showpiece featured 37 of the world’s top 50 security solutions providers, including the entire top ten of Honeywell, Hikvision, Bosch, Safran, Dahua Technology, Assa Abloy, Tyco, Flir Systems, Samsung Techwin, and Axis Communications.
2
Dubai, UAE: Intersec is the world’s leading trade fair for security, safety, and fire protection, featuring more than 1,300 exhibitors from 54 countries, and attracting 31,000 visitors from 128 countries.The three-day event shines the spotlight on the latest technologies and innovations in the seven focus areas of Commercial Security, Fire & Rescue, Safety & Health, Homeland Security & Policing, Information Security, Smart Home and Physical & Perimeter Security.
1
2016 Gallery
Read more
Intersec 2017 – from humble beginnings to a global powerhouse Three-day Dubai security, safety, fire protection trade fair to pass 1,300 exhibitor mark
22-24 January 2017 Dubai International Convention and Exhibition Centre
Security you can see and feel with the tactile impression feature of the SD460
Back
Next...
Add an extra layer of security on the SD160 with UV ink
Create professional looking ID Cards
The solution for creating IDs For Life
www.entrustdatacard.com/contact Corporate Headquarters: Entrust Datacard 1187 Park Place, Shakopee, MN 55379, USA EMEA – UK Office, Forum 3, Solent Business Park, Whiteley, Fareham, Hampshire, PO15 7FH, UK Dubai – Jebel Ali Free Zone, LOB 17 - Office 17408 P.O. Box 17220, Dubai, U.A.E. +971 4 8816203 +971 4 8816856 +971 50 4509583
The new world of work — with more devices, more data and more mobile workers — presents new identity challenges to organizations of all sizes. Your employee and visitor ID needs can vary, depending on factors ranging from the number of people in your facilities to the physical and digital assets you want to protect. Your identity solution should be flexible enough to accommodate your exact needs.Entrust Datacard offers employee and visitor ID solutions to meet a full range of requirements, from basic photo ID cards to high-assurance credentials that leverage smart cards and other advanced technologies. We offer complete software-printer-services-supplies solutions that make it easy to deploy the precise identity solution to your enterprise needs.
IMAGE GALLERY
WATCH THE VIDEO
CONTACT INFO
COMPANY PROFILE
EMPLOYEE BADGES AND VISITOR IDS
Secure choice
As demonstrated, while security managers are right to question the security of mobile access systems, this technology has proven itself very capable of standing up to security threats to buildings. Being able to offer multiple security layers, dynamically responding to security issues, inspiring employees to better protect physical architecture and being on the cusp of new security developments, mobile access is a secure choice for any businesses’ building access control system.
The culture of security
Mobile access control systems also create a culture of security even if your employees do not realise it. With a card or token access to buildings and on-site premises staff are effectively burdened with the responsibility of constantly carrying an additional item, one they would not carry normally. As such, if their card is lost or stolen they are less likely to notice it and hence slower to report it. This leaves your physical infrastructure vulnerable, with a valid card potentially falling into the wrong hands. Conversely, an employee instantly feels more attached to their mobile devices, so if a phone is lost or stolen, it is reported right away and the mobile ID can be immediately revoked.
Transmission between a mobile device and the access control reader
When access is granted to an employee to enter a building, the transaction between the app on the mobile device and the access control reader is independent of the communication protocol in use. Transmission over-the-air via NFC or Bluetooth Smart to issue the key is protected by the latest technology and cannot be stolen when authorising access over-the-air. The device and reader both use high-security cryptographic communication techniques to prove to the other that it is trustworthy. Furthermore, no Bluetooth pairing is required between reader and device, as only eligible devices can interact.
Mobile IDs cannot be manipulated
Mobile identities must be signed and encrypted to prevent manipulation. All mobile identities and user information should therefore be protected in a secure vault provided by hardware security modules, where all encryption keys are stored and used in cryptographic operations. Looking at mobile IDs, hey are stored in the app operating sandbox, an area within the device, which has been designed for the storage of sensitive information. The information that is stored is encrypted, so it cannot be cloned or stolen via unauthorised access to the phone. Mobile IDs are not transferrable, but specific to the device they have been issued to. Each Mobile ID is unique per device.
Mobile credentials are based on the latest technology advancements
It is paramount that encryption methods have met stringent security criteria. A secure mobile access system will typically have security protocols that are certified by credible independent institutions. For example, Suite B Cryptography algorithms, Advanced Encryption Standards (AES), namely, AES-128 and Secure Hash Algorithm (SHA) by the National Institute of Science and Technology (NIST). A mobile access system that is standards-based and complies with these rigid security protocols incorporating secure messaging, and strong authentication will result in providing peace of mind to security managers that their employees’ data will remain confidential.
Rarely misplaced and consistently in hand, the mobile device has become the most valued technology we own. However, as a recent trend report by IFSEC Global revealed, almost 80% of security managers surveyed feared that integrating mobile access solutions into their physical access control architecture might actually increase system vulnerability. So what are the major concerns for security managers?
TIME to go MOBILE
For more visit: www.hidglobal.com
5
GEUTEBRUCK provides a complete package of hardware and software from a single source. This is an enormous advantage for the customer, as only if both components are perfectly matched can optimal, sustainable performance be achieved. Customers and users in more than 70 countries around the world rely on the expertise of the company and have come to appreciate the high level of reliability, exceptional performance and quality "Made in Germany".
GEUTEBRUCK complete solutions inspire through their outstanding quality and are used by numerous renowned companies in various industries across the world. In addition to industrial companies and power utilities, museums, banks, airports and prisons rely on the high quality of the security technology. This is due to the broad industry know-how of our experts and our business model: software and hardware components developed in-house combined with selected procured products. In addition, beyond classical security applications, GEUTEBRUCK now offers solutions such as supply chain security – the visualization and documentation of supply chains. "Our solutions make the environment of our customers safer – and help promote business success: through intelligent visualization of processes, supply chains can be optimized – the results speak for themselves," says Christoph Hoffmann Managing Director of GEUTEBRUCK.
GEUTEBRÜCK EURASIA | MIDDLE EAST Harun Özerdem, Area Sales Manager Hilal Mahallesi Cezayir Caddesi No: 23 / A06550 Cankaya/Ankara Tel: +90 312 441 93 33 Email: harun.oezerdem@geutebrueck.com
In today’s world, aviation companies and logistic companies in general are subject to intense scrutiny and they are faced with daunting challenges. The most pressing of these are certainly security needs and the related regulatory requirements. In addition, the increasing volume of goods and passengers requires a sophisticated logistics system to maintain smooth operation. With GEUTEBRUCK Video Security you can optimize processes, manage compliance and solve security problems. The German company GEUTEBRUCK is one of the world's leading providers of comprehensive hardware and software for video security solutions. GEUTEBRUCK develops solutions for challenging industry-specific applications, including for airports.
CAMERAS Our megapixel cameras are specifically designed for high-performance in extreme low-light & harsh conditions. We use high-end sensors, Optical lenses and DSP chips to reproduce great clarity. Installation is easy with remote focus and iris control which provides good optical quality to deliver the best evidence. All Cameras are ONVIF compliant. ACCESS CONTROL Our UL listed Network controllers are most advanced, resilient and scalable from 2 ~ 2000 door access points throughout your building with Secure and Remote System Management. It provides seamless integration with WatchNET’s range of RFID proximity, PIN, PIN & PROX, smartcard, elevator control, I/O controllers and biometric readers. RECORDER & STORAGE WatchNET offers complete range of recorders & storage servers ranging from Entry to Enterprise Class projects. To address the changing surveillance data needs of organizations all over the world, WatchNET bestow the robust portfolio of surveillance solutions with open platform, best-of-breed technologies with scalable mass storage system. INTEGRATED SOFTWARE WatchNET introduces integrated HD-VMS software which is an enterprise class integrated solution for Access Control, Intrusion Detection, CCTV, Time & Attendance and Building Management. This powerful software manages multiple tasks using Windows Professional Versions and supports databases such as MS-SQL and MS Access. For more information visit: www.watchnetinc.com E-mail: info@watchnetinc.com Contact: WatchNET Inc. 351 Ferrier Street, Unit 5 Markham, Ontario, L3R 5Z2, CANADA Phone: 416-410-6865 / 1-866-843-6865 Fax: 1-866-331-3341
Resolver’s integrated risk management platform supports the Response and Recovery process when an event does occur; including Incident Reporting, Incident Response and Investigations. We also help Plan and Prepare your organization to limit the likeliness or impact of events from occurring; this includes Risk Assessment, Enterprise Risk Management, Internal Control, Internal Audit, and Compliance. Resolver’s team is comprised of security, risk, and compliance experts supporting customers across 100 countries with offices in North America, United Kingdom, and the Middle East. Contact: Walid Kattan, Internet City Building 1 Office #124 UAE Tel: +971 (52) 401-2418 Email: walid@resolver.com
close
WATCH VIDEO
VELOX CLOUD is the new era by ATEÏS, Our R&D has synonymously integrated both Data and Fire Detection for the very first time. We believe that the VELOX CLOUD is an experience. An experience that is refined, and pushed to the limit to define a new technology that is simple to commission, easy to install, and user friendly. A new VELOX CLOUD era of fire detection is born, in many ways it is the distinction that our customers love in our products. The full integration is now simpler, more essential and certainly more capable than ever before. We believe that VELOX CLOUD is a new experience that harmoniously integrates fire detection on the cloud, while enhancing its visual experience to the user. Our engineers keep on re-defining the boundaries to a limit that you are unlikely to have ever realized before. VELOX CLOUD is delivered with intuitive design, built on a foundation of innovations and features and delivered with unparalleled synergy along with our leading VELOX Fire Alarm Panels and Solutions that re-define the term “integration”. For more information please visit www.velox.ae
Hochiki Middle East FZE is an industry leading manufacturer of fire detection and emergency lighting solutions. Offering cutting edge EN, UL and FM approved ranges, Hochiki sets the benchmark for high-integrity and long-term reliability. With global group sales turnover exceeding £400m, Hochiki is a wholly independent, multinational, publicly listed company with over 1,500 employees working across 3 manufacturing plants, 32 sales offices and 18 subsidiaries. For more information about Hochiki products and support, visit www.hochiki.ae. Hochiki Middle East FZE Office No. C-205, HQ Building Dubai Silicon Oasis PO Box 341415 Dubai, UAE Tel: +971 4372 4130 Fax: +971 4372 4131 Email: sales@hochiki.ae
6. Monitor power consumption
Understand the power consumption in the building and therefore be aware when there is any unusual ‘heavy’ loading and why. If the simple steps are followed by those responsible for fire safety management the risk of an electrical ignition leading to fire will be significant reduced.
5. Provide adequate powerpoints
Eliminate multi-plug adaptors and extension leads by providing enough sockets. Extension leads are a temporary measure (1 week max) and one electrical plug per socket is an effective policy - combined with good cable management to eliminate leads being damaged by wear and tear (i.e trolleys).
4. Thermography audits
It is now commonplace for thermographic surveys to be undertaken in building to spot electrical equipment and connections that are overheating and failing. Using specialist cameras that detect infra-red heat, thermography is a valuable tool to prevent electrical fires.
3. Audit portable equipment
Carry out regular audits of portable electrical equipment and remove anything that is unsuitable or damaged. Have a clear policy of what can and cannot be brought into the building and plugged into the system; especially heating and catering equipment (i.e. blower heaters and toasters)
2. Know the system
Ensure a firm understanding of the electrical distribution system within the building and business. When was it fitted? Are there original schematic diagrams? Has the system been altered and amended? What are the system protection components – how do they work?
1. Competency
Make sure that the person charged with maintaining the power systems and electrical integrity is competent and has the appropriate technical qualifications. Allow only competent people to maintain the electrical equipment, including contractors. Make competency part of any preferred contractor selection criteria.
The recent spate of tall building fires have highlighted the need for ongoing fire safety management, to prevent fires from starting and spreading. Russ Timpson highlights the key knowledge Fire Safety Managers need to know about the most common types of ignition sources in tall building - electricity, the cause of which can cover a multitude of issues... 1. Incorrect fitting/specification 2. Electrical malfunction 3. Short circuit 4. Incorrect use/operation 5. Design faults 6. Wear and tear
6
Ignition Sources: Electricity
FLIR Systems is the world leader in the design, manufacturing and marketing of thermal imaging systems for a wide variety of commercial and government applications. FLIR offers the widest range of professional security solutions, with a focus on flexible open platform infrastructure, that seamlessly integrate with third-party products to ensure the highest levels of interoperability and performance. FLIR’s comprehensive family of security solutions include integrated video management systems (VMS), advanced video analytics, thermal imaging cameras, analog and motorized IP camera systems, proprietary MPX low cost megapixel-over-coax technology and a wide range of 3rd party integrations. Visit: www.flir.com/law-enforcement
Visit Evac+Chair’s website for more details
The World's No.1 Stairway Evacuation Chair