securitylinkindia

Top Video Surveillance Trends for 2018 – The A to I of Video Surveillance Terminology

Demand for professional video surveillance cameras has been growing quickly and is forecast to continue growing in 2018. It is estimated that less than 10 million surveillance cameras were shipped globally in 2006, which grew to over 100 million in 2016, and is forecast to make over 130 million during 2018. Despite this increase in demand, the average price of cameras and other video surveillance equipment will continue to fall quickly. As a result, IHS Markit forecasts that in terms of US dollar revenues the world market for video surveillance equipment will grow at an annual rate of less than 6% in 2018. It will be challenging for vendors to continue to grow revenues and margins, but there will be opportunities for well-placed vendors. For example, both the South East Asian and Indian markets are forecast to grow at higher than average rates. There is also great potential for the next generation of products powered by technologies like deep learning and cloud computing. So, what will be the big stories during 2018? Deep learning, GDPR compliance and drone detection technologies are just some of the trends discussed in this eighth annual trends IHS white paper. The following articles are designed to provide some guidance on the top trends for 2018 in the video surveillance industry.     By Jon Cropley   The A to I of Video Surveillance Terminology The past 12 months have seen a range of new terms becoming regularly used in the video surveillance industry. We attempt to provide a brief summary of some of these. AI (artificial intelligence): Computers are able to perform specific tasks as well as, or even better than human intelligence. In the context of video surveillance, AI is used in the field of computer vision to classify visual images and patterns within them. Big data: Huge amounts of different information are  stored, organized and analyzed by computers to identify trends, patterns, and relationships. In the context of video surveillance, the data could be metadata describing hours of video surveillance footage combined with other data sources to highlight patterns relating to security or business operations. Cloud computing: Instead of using a local server to store or manage video surveillance data, use a network of internet-connected remote servers. Generally this network has the ability to provide additional resource if and when required from a larger available pool. The available resource may be clustered into a datacenter or network of datacenters. These may be private (entirely or partly owned for exclusive use by specific organization/s) or public (resource accessible to multiple separate users). Deep learning: A branch of machine learning and subset in the field of AI. Deep learning makes use of algorithms to structure high-level abstractions in data by processing multiple layers of information, emulating the workings of a human brain (a neural network). Edge computing/ storage: Performing data processing and analytics/ storage closest to the source of the data (normally, in this context, in a video surveillance camera). Face recognition: When a video surveillance system can automatically match a person’s face against a database of individuals. GPU (graphics processing unit): A programmable chip specialized for use in image processing. Due to the requirement to be able to simultaneously processing multiple large data blocks required in modern image processing, GPUs have been found to be highly suitable for deep learning/ neural network processing. H.265 (or MPEG-4 part 2): H.265 is a video compression codec standard approved by the International Telecommunications Union (ITU-T). Compared with H.264, H.265 has the potential to use 30-40% less bandwidth for a video stream of the same quality. IoT (Internet of things): IoT is not a specific device or technology – it is a conceptual framework, driven by the idea of embedding connectivity and intelligence in a wide range of devices. IHS Markit defines an IoT device as a device which has some form of embedded connectivity that allows the device to be directly connected to the internet (i.e., IP addressable), or allows the device to connect (tether) to an IP addressable device. In the context of video surveillance, this could be using video surveillance data with other sensors or sources of information.   IHS Analyses  Big Differences between the Chinese Market and the Rest of the World  By –  Jon Cropley General Data Protection Regulation (GDPR)   By – Josh Woodhouse Video Surveillance Fault Tolerance   By – Josh Woodhouse Forensic Video Analytics as a Service   By – Josh Woodhouse The Evolution of Deep Learning in Video Surveillance   By –  Monica Wang Drone Detection Technologies   By –  Oliver Philippou  

Read More
Axis THERMAL CAMERA SECURITYlINK INDIA

Axis First Thermal Camera in P-Line

In launching the first thermal cameras in its P-line – Axis Communications is bringing the benefits of thermal imaging to a broader range of customers and environments than ever before. The cost-effective cameras deliver thermal imaging capabilities to small and mid-size systems with budget limitations – such as schools, care environments and independent retailers – allowing for intrusion detection and incident identification, without compromising individuals’ identities. Thermal technology is renowned for ensuring reliable detection with a low rate of false alarms, but until now the cost of high-quality thermal imaging has been beyond the reach of organizations with limited budgets. The new AXIS P1280-E thermal network camera is an indoor/ outdoor camera with a flexible form factor that allows the thermal sensor unit to be placed in locations with limited space and it comes with a wide range of mounting accessories for both wall, ceiling or recessed installations. AXIS P1290 thermal network camera is an indoor camera protected in a dome casing for discretion. Ideally, they can be used as a cost-effective detector with visual confirmation for safety of both people and property in numerous environments. The cameras have built-in analytics such as AXIS video motion detection that can send an alert when it detects motion from moving objects within a predefined area. The cameras also support AXIS camera application platform, which is compatible with a broad range of third-party applications. Martina Lundh, Global Product Manager at Axis Communications explains the benefits of thermal imaging: “In environments where the privacy of individuals is paramount – for example schools and care homes – thermal imaging detects incidents without revealing personal details of the people in the image. Together with analytics these new cameras can trigger alerts or alarms in response to patient or resident falls, allowing staff to take immediate action.”

Read More

Hikvision Releases White Paper on Cybersecurity

Hikvision, the world’s leading IoT solutions provider with video as its core technology, has released a cybersecurity white paper designed as an educational resource for the security industry. Hikvision believes it is crucial for industry leaders to work together to understand cybersecurity risks and take measures to meet those challenges for the IoT industry. “The surveillance industry originally relied on analogue technology which operated on private networks. In those days, the industry focused on product cost, performance, and ease of use. As the industry has transformed from analogue and isolated to digital and networked, we have seen the benefits that the digital and networking revolution brings to the surveillance industry. However, we have also witnessed the spread of various types of malicious cybersecurity attacks from the Internet to the surveillance industry,” said Bin Wang, Chief Officer at Hikvision Network and Information Security Laboratory and Network Security Department. The Hikvision cybersecurity white paper outlines current security threats for the Internet of Things, and for network and information security in the surveillance industry. It explores the product security lifecycle and product security research to protect user data in comprehensive ways, and safeguard assets from common cyber threats. Hikvision is committed to supporting and adhering to internationally recognized cybersecurity standards and best practices. Hikvision actively supports industry research efforts to increase network defense capabilities. It is dedicated to using and improving open and transparent methods so that customers and users can assess Hikvision’s cybersecurity capabilities. “Cybersecurity is not only the responsibility of product manufacturers. Everyone who participates throughout a project’s lifecycle including users, system integrators, operators, system designers, and other service providers, are all responsible for using cybersecurity best practices. All stakeholders must contend with the same cybersecurity challenges. The solution to this problem is 30 percent technology and 70 percent management,” said Yangzhong Hu, CEO of Hikvision, “Cybersecurity challenges will always be around, so we must remain vigilant and keep working on improving product security.”    

Read More

FICO PREDICTS AI and Blockchain to Meet in 2018

The growing use of blockchain technology in financial services will include a healthy dose of artificial intelligence, as new, automated analytic techniques look for patterns in the ‘relationship data’ about people, contracts and transactions. That merger of two hot tech trends is one of the predictions made by Dr. Scott Zoldi, Chief Analytics Officer at Silicon Valley analytic software firm FICO, and a recognized expert in the field of artificial intelligence. “Beyond its association with crypto-currencies, blockchain technology will soon record ‘time chains of events,’ as applied to contracts, interactions and occurrences,” Dr. Zoldi wrote on the FICO Blog, “Think about renting a car. In the future, you will be able walk up to a car to lease it, but you’ll do so with a micro-loan for which you are approved to lease the car for, say, an afternoon. This micro-loan will have insurance contracts attached to the blockchain, and a codified history of the car’s history of drivers, events, and maintenance. As you drive through the city and interact with toll roads and parking spaces, all of this information will be automatically recorded and monitored on the blockchain. When you leave the car and lock it, the lease is complete and auditable on the chain. These kinds of data event chains will create new opportunities for graph analytics and novel new AI algorithms to consume relationship data at scale.” Zoldi, who leads the team that builds FICO’s AI analytics for solutions such as fraud management and cybersecurity, also sees a rise in what he calls “defensive AI.” “Attackers use malicious AI and ML to circumvent the protective systems companies have in place,” he wrote, “This arms race, in which criminals arm themselves with adversarial machine learning, tops McAfee’s 2018 security forecast. In 2018 we will see new systems that will seed their outputs with ‘faint signatures’ to mislead, confuse or identify the attackers learning the AI system’s response.” As chatbots get smarter and use more AI, they will not only understand us better, they will also be better at manipulating us, Dr. Zoldi predicts. “By quickly understanding the tone, content and predicted highest-value conversational paths to meet various objectives, chatbots using AI can also learn the magic words to sway our attitude, actions and possibly elicit en masse reactions,” he wrote. Dr. Zoldi’s other predictions for AI in 2018 are: AI will have to explain itself. “The need for Explainable AI (XAI) is catalyzed by regulations like the European Union’s General Data Protection Regulation (GDPR), which requires explanations for decisions based on scores, including those produced by AI and ML systems.” AI will augment us. “Whether it’s drawing the information together for us to be superhuman at investigation, data recall, or improving how we learn new topics, AI will augment our ability to process new information. The question will be as to whether our human brains will atrophy, improve or simply evolve to the rate and frequency of data.” AI will get operationalized. “In 2018, companies will focus on operationalizing AI, particularly in the cloud, to more easily build, refine, deploy and enhance machine learning environments.”

Read More

Genetec Security Center 5.7

Genetec Inc. has recently introduced a new version of Security Center, an open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. Security Center 5.7 allows users to make insight-driven decisions based on security and analytics data. This latest version also adds privacy protection for individuals, efficiently distributes HID mobile access control credentials, and ensures business continuity with native access control fail-over. Protecting data, the network, and the organization Cyber resilience is about securing communications, authenticating users, and protecting businesses from employees unwittingly allowing vulnerable network-connected devices to threaten the business. To improve overall cybersecurity, Security Center now automatically identifies whether connected edge devices are running the most recent and secure device firmware. Once notified of known vulnerabilities and given firmware recommendations, administrators can take immediate action and eliminate known security gaps. ‘GDPR-ready’ privacy and video analytics More than a trend, protecting individual privacy is fast-becoming a necessity of security management. In some regions like Europe, it is already becoming codified in law. By embedding the KiwiVision™ Privacy Protector ™ module, Genetec enables organizations to automatically blur and mask sensitive video, and anonymize people to protect their privacy. Privacy protector was recently re-certified for its fourth consecutive term with the European Privacy Seal (EuroPriSe), and remains the only video solution to hold this certification.Privacy protector is also rated as ‘GDPR-ready,’ meeting the stringent compliance criteria of the General Data Protection Regulation (GDPR), which will go into effect May 25th, 2018 in the European Union. The KiwiVision Intrusion Detector™  module is also unified with SecurityCenter 5.7 to generate real-time alarms that automatically notify security staff when individuals or vehicles enter sensitive areas, secured perimeters, or restricted zones. Through an accompanying analytics-based intrusion report, operators can now engage in deeper investigations. Additionally, to assist users in scanning through hours of footage, a new Quick Search forensics tool identifies changes in recorded scenes in seconds, ignoring irrelevant footage to narrow down searches. Enterprise access control with native failover and HID mobile credential support The Security Center Synergis™ access control system now comes with built-in failover, so customers can take advantage of continuous monitoring of devices and events. This safeguards critical information and ensures business continuity, even when servers fail. The new HID Mobile Access Portal API integration allows organizations to efficiently deploy mobile credentials to their employees, contractors, and visitors. These credential holders receive an email to download the HID Mobile Access Portal application on their devices, which enables access via Bluetooth® or NFC wireless technology. Employees and visitors will now be able to use their smartphone, wearables, and tablets to gain approved access credentials to securely open doors and defined areas of the premises. Insight-driven reporting and decision support The new advanced Security Center reporting feature intuitively displays data in dynamic charts and graphs, helping organizations gain a deeper understanding of their data, identify trends, and spot undetected patterns. Visualization of physical security data can be employed to quickly isolate security gaps and suspicious activity, identify maintenance issues, find valuable opportunities to improve operations, and ultimately make smarter decisions.    

Read More

The Value of Intelligent Solutions For Hospitality Security

The hospitality industry is constantly evolving. Hotels focus on leveraging technology to enhance the user experience, which includes streamlining processes and adding additional amenities that draw repeat visits. At the same time, efforts to maintain the safety and security of individual hotels and hotel chains face a sea change. Although security began as a property protection function, it has broadened to include plans to mitigate several types of threats, ranging from fraud and malfeasance to terrorism to response to major events including natural and manmade disasters. It is clear from the growing demand for technology solutions within this segment that hospitality is very focused on ensuring a safe environment for those inside the facility. Hotels strive to deliver exceptional customer service while balancing the safety and security of guests, employees and visitors with a welcoming environment. Modern risks, including those related to cybersecurity, liability and compliance, have propelled the need for stringent yet creative security strategies to be integrated into a hotel’s overall business strategy. As hotels don’t report incidents, there is limited public data regarding the safety and security of these properties. However, it’s still clear that threats exist in hotels and resorts. A 2009 study that examined crimes reported by 64 Miami Beach hotels to the Miami Beach Police Department showed that theft is a chief problem, with nearly half of the 756 reported crimes being thefts. Growth ahead Threats like those mentioned above continue to be a significant driver in the deployment of video surveillance, video intelligence technologies and other security systems. The demonstrated value of video drives further interest in surveillance platforms, and this along with other factors propels the use of video surveillance as it continues to advance globally. According to a 2017 report from Research and Markets, the video surveillance market is projected to grow at a CAGR of 9.6 percent from 2017 to 2023, with hospitality, healthcare and education verticals forecasted to grow at an even higher rate. Technology plays a critical role in the effectiveness of a security function in all organizations, and the hospitality industry is no exception. In research conducted by Professor Alexandros Paraskevas, Chair in Hospitality Management at the University of West London, with assistance from the International Centre for Hotel and Resort Management, a large majority of hotels reported that video surveillance is by far the ‘core’ solution in use today. According to one participant, “95 percent of the discussion on security technology investment is about video surveillance.” Most executives consider video to be the leading investment, used as a deterrent or as an investigative tool. It is predominantly used in a reactive, not proactive manner. Even though technology is considered a force multiplier, many hotels struggle with allocating sufficient budget for security measures. Security investment within the hospitality sector is typically a ‘reluctant spend’ since it is not considered a revenue generator. That does not mean that the hospitality industry doesn’t prioritize security, it’s just a matter of setting the right mindset. Owners and managers who realize the importance of employee and guest safety, and the overall benefit of security are keener to discuss investment. This is why security leaders must be willing and able to educate senior leaders on the technology being proposed. As video surveillance becomes more prominent as a business operations tool in addition to a critical piece of a comprehensive security plan, valuable innovations such as panoramic and 360-degree cameras and video analytics, are important tools to reduce cost and increase coverage of large areas such as hotel lobbies and parking lots. But these products are only one piece of the puzzle – a comprehensive security solution can not only prevent and provide investigative/ forensic support, but also reduce insurance premiums and increase business. It is critical that video cameras and other security solutions are integrated to form a more comprehensive view of a hotel’s overall security posture. Simple, intelligent systems that bring information to the operator are optimal because they help hotels gain new levels of intelligence to help mitigate risks more effectively and proactively. The future is now Advancements in technologies propel new ways for security technology – most predominantly video – to be leveraged throughout an organization. Video data can be leveraged for additional uses that span several departments including business operations and marketing. The capital investment in video capture technology then becomes more widely distributed as more departments utilize the information, going from a required ‘grudge purchase’ to a ‘Swiss Army Knife’ of operational benefits. For example, the future of analytics provides heat-mapping functionality that hotels can use to identify busy areas for target marketing. Users can analyze traffic and people flow, and use that information to determine how to best use specific areas. With facial recognition software, hotels can better address the needs of VIPs by allowing hotel staff to be alert when a frequent guest arrives. How’s that for customer service? Hotels and resorts can use advanced technologies to better serve guests in an effort to deliver the kind of personalized service that customers will come to expect from their visit in the future. This will allow brands to build long-term relationships and ensure return visits, leading to increased revenue streams and a successful sustained business model. At the same time, hotels will be able to realize new levels of safety and security to keep their most important assets protected.                                    Author:-       Abhishek Kumar ( Regional Director, Southeast Asia, Oncam)

Read More

New NIST Forensic Tests

Data found on a suspect’s computer, cell phone or tablet can prove to be crucial evidence in a legal case. A new set of software tools developed at the National Institute of Standards and Technology (NIST) aims to make sure this digital evidence will hold up in the court. The software suite, referred to collectively as federated testing tools, is designed to help law enforcement and forensic practitioners with a critical early step in evidence collection – making a copy of the data from a seized electronic device. Because a suspect’s guilt or innocence can hang in the balance, both the prosecution and the defense must agree that the digital forensic process did not introduce any unseen errors into the data, and that the methods they are using work as expected. Extracting and copying data is a risky process because of the rapidly shifting digital landscape that the devices inhabit. Confronting the practitioners are all the differences in data and format that can exist between one device and the next – because of the sheer number of different manufacturers, and because of the frequent software updates pushed to various makes and models. “It’s hard to keep up,” said Barbara Guttman, one of the suite’s developers at NIST’s Computer Forensics Tool Testing project, “You don’t want to risk your copying software failing when you try to get data from some new computer that is critical to your case. So, we created these tools to help ensure that the copying software works effectively and transparently.” The federated testing tools allow authorities to run tests in advance on their digital forensic software to make sure ahead of time that it will not fail them when a suspect’s personal computer, media or device arrives in the forensic science lab. Guttman describes the suite as the three most critical tools for evidence acquisition and preservation, each addressing one aspect of the copying process. “One tool tests software for copying computer disks, while another tests mobile device data extraction software. These two test protocols were available previously, but the suite is now completed with a new third test for ‘write blockers,’ which are a sort of one-way valve for data-copying software. An effective write blocker allows data to flow only from the seized device to the copying computer, not the other way around. Later updates to the suite will address additional forensic functions,” said Guttman. The full suite is a freely available Linux file that anyone can download and burn to a blank CD. They can use the disk to boot their workstation and test their copying tools via a user-friendly interface. The NIST software also allows different forensics labs to exchange the results of their tests with each other, so that they can share the burden of exploring how well a copying method works on a specific platform and operating system. Running copying software through its paces generates a report that disparate organizations can share among themselves or with the world, allowing them to indicate whether they found anomalies during the testing or not. “Pooling these traceable results will mean less work for any given lab or organization,” Guttman said, “We don’t require they share the tests, but a rising tide should raise all boats.” Guttman cautioned that the tools will not ensure that a copying or digital forensic process is flawless, only that the results of the job are clearly visible to anyone. “Evidence doesn’t have to be complete to be admissible,” she said, “The key here is that copying does not introduce errors into the data that no one can see.” “Interest in federated testing will go beyond law enforcement agencies,” Guttman added, “Any organization that performs forensics such as civil law firms and corporate enforcement offices, will find a use for the test suite.”  

Read More

Industry CEOs Comments on 2017 at a Glance

2017 witnessed various ups and downs across business communities in India, including Private Security Industry, in pursuance of multiple reforming policy and regulatory initiatives taken by the Government of India. While calls for Make in India, Digital India and Skill India, Safe City and Smart Cities, and other critical infrastructure development projects have opened far-reaching opportunities for the industry to flourish, demonetization and implementation of GST have been ordered to keep a hold on the unaccounted transactions, corruption, and other malpractices during business deals. The private security industry is one of the fastest growing business of the country which has been growing at the rate of more that 20% in recent past, much higher than the global growth rate, and various reports suggest that it would continue to grow at the similar rate. When the year is now heading to close, SecurityLink India spoke to some eminent players of the Indian Security Industry to find the actual experiences they have been through. Here are some excerpts:   Sanjeev Sehgal, Founder & Managing Director, SPARSH SecurityLink India: About six months on, what is your take on GST and the implementation thereof for you and the security industry at large? Sanjeev Sehgal: Today, there are less complexities when we sell products from one state to the other; now we don’t have to pay multiple taxes like CST, Entry Tax, Octroi etc. This would certainly be helpful in expanding market nationally. Things have become less complicated now. However, the biggest challenge which GST has offered is the payment of GST at the time of removal of stocks from the factory, even in the case of branch transfers. It is adding pressure on working capital requirements, which is always a major issue for manufacturers. GST is turning India into one common market, leading to greater ease of doing business and big savings in logistics costs. SecurityLink India: How has the ‘Make in India’ call impacted you and the entire security industry so far? Sanjeev Sehgal: The ‘Make in India’ initiative gives distributors in security systems a platform to reach out to people through an organized method. Since its launch, the Make in India initiative has started showing results. Increased production outputs and growing FDI into India are seen as a result of the initiative. IP video surveillance and CCTV are quickly becoming the norm in public spaces. With the security industry slated to grow to a INR 80,000 crore industry by the year 2020, the ‘Make in India’ initiative has already given this industry a major boost towards that direction. SecurityLink India: Kindly name and give a brief about the products and solutions that you floated during 2017. Sanjeev Sehgal: The security market is experiencing an upward trend in upcoming technologies. We at Sparsh have successfully introduced contemporary trends in the surveillance market with Cloud surveillance. We have recently introduced an Indian cloud computing platform, developed indigenously in India. Remote monitoring, Wi-Fi integrated solutions and customized solutions for specific verticals are some of the upcoming technologies in the security solutions market developed by Sparsh. These aid in solutions such as ANPR, critical infrastructure, border security etc. SecurityLink India: Which are the major projects you accomplished this year? Sanjeev Sehgal: This year we have bagged some prestigious projects such as Delhi schools, FCI, CISF etc. SecurityLink India: What are your plans for the new year? Sanjeev Sehgal: In the forthcoming years, we would like to take the idea of ‘Made in India’ and ‘Make in India’ to a global platform as a leading CCTV manufacturer of India. Sparsh as a brand will target Government, Safe City, Smart City and SMB market and which is the large and sizable business opportunity for us. In the Union Budget, there were many provisions for ‘Make in India.’ We are benefited by such initiatives as an indigenous Indian manufacturing company and brand. Smart Home solution will be another area we would be targeting for growth. In the near future we have plans to launch many new products in this space.   Robbin Shen, Director, India & SAARC, Dahua Technology SecurityLink India: How would you rate this year for you in terms of business opportunities and procurements in India? Robbin Shen: 2017 has been a successful year for Dahua as our security products and solutions have been well received and accepted in the market for their intrinsic strengths such as high quality, durability, reliability, and the capacity to function in all weather conditions. Thus we can claim it has been an excellent year for us.   SecurityLink India: India has jumped 30 places to 100 in the World Bank’s ‘Ease of Doing Business’ Index. What does your wide-ranging experience in security industry suggest? Robbin Shen: The current Government of India has taken a number of industry-friendly measures such as Smart Cities, Safe Cities, Digital India, and recently the implementation of GST. They have certainly made favorable impact on the prospect and ease of doing business environment in the country, albeit, it has yet to go a long way at the regional and local levels. India has enormous potential and it will become a major market for us. SecurityLink India: About six months on, what is your take on GST and the implementation thereof for you and the security industry at large? Robbin Shen: We welcome the GST initiative taken by the Indian Government. It has reduced the prices of many security items from 28 percent to 18 per cent. There are suggestions to reduce the rate further which, if implemented, will be a boon to all the stakeholders from manufacturers to customers. As prices decline affordability increases, and that makes more people to install security devices to safeguard their lives and properties. SecurityLink India: Kindly name and give a brief about the products and solutions that you floated during 2017. Robbin Shen: We have launched a number of security products, solutions and latest technologies – mainly Extended Power over Ethernet Devices or ePoE including network cameras, switches and network recorders….

Read More

DIY Security Systems & the Future of the Professional Installer

By Anna Sliwon – Research Analyst, Building And Security Technology, IHS Markit In 2016, the global market for DIY security equipment reached $60 million, with the great majority of gear – 85 percent – sold in the Americas. The American market for DIY intruder alarms is forecast to grow at a CAGR of more than 20 percent over the next five years. In recent years, the residential security market has seen an influx of DIY intruder alarm system providers from internet service providers such as Deutsche Telekom and consumer electronics companies including Ring and Nest – the latest such providers to offer DIY security systems. DIY on the upswing The popularity of DIY systems is on the rise for several reasons. Self-install systems have no installation costs and can be set up fairly quickly. Equipment usually comes pre-configured, and often only requires a basic understanding of wireless technology. And end users are becoming more tech savvy thanks to the increasing availability of how-to video tutorials on intruder alarm system installation. Alarms can be monitored through a dedicated smartphone application, bringing the costs down to zero while also freeing users from lengthy monitoring contracts. Professional monitoring contract options for DIY systems often come at a lower price than contracts for professionally installed systems. Also, with the growing availability of pay-as-you-go monitoring, users can opt to have the alarm monitored only a few months a year, further reducing the overall annual cost of monitoring. In some cases, the cameras used in DIY systems are more affordable when compared to those offered as part of a professional package. In certain DIY systems, cameras can also be offered at a discounted rate if the user opts out of alarm monitoring services for the camera. DIY end users also have more options available to them, as they can choose from a wide range of consumer devices. With professionally installed systems, usually only one type of pre-selected camera is offered. This limits the end user’s choice to accepting the supplier’s camera or not having a camera in the system. Very often, equipment is interoperable with a wide range of commercially available video cameras, voice speakers or video doorbells, and allows for virtually unlimited expansion and customization. Professional security systems also allow for expansion, but the services of a professional installer may be required to integrate some of the devices, and advanced features are often turned off when a service contract ends. This means that a customer may still be able to arm and disarm the security sensors for a local alarm, but any advanced automation features will not be available to non-active subscriber accounts. Professional solution providers are under pressure New players have entered the security marketplace from other industries, resulting in increased competition and pricing pressures. The flexibility of DIY systems has allowed non-traditional security equipment providers to increase the overall penetration rate of homes with alarm systems – something professional equipment providers have long struggled to achieve. DIY systems are most likely to be chosen by young apartment renters, where there is no previous history of security equipment and the likelihood of annual moves is common. In regions with high population densities, this will lead to the replacement of the professional install option, leaving DIY as a first choice for newcomers to alarm systems. For new homeowners who are also young families concerned with monthly fees, DIY systems may provide a viable option for securing property without long-term contracts. The rise of the DIY market poses the biggest challenge to suppliers of professional security equipment. A blessing in disguise New players from other industries bring into play additional marketing resources to help educate consumers and drive increased awareness of the benefits of security systems. DIY systems have helped lower the barriers to acquiring security systems. As the needs of DIY consumers evolve over time (for instance, they become property owners), they are more likely to switch to professionally installed systems, thereby increasing opportunities for the professional market via system upgrades. DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognizable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment and operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly. Not going away anytime soon The need for professional installers will not disappear completely anytime soon. Professionally installed systems provide added peace of mind. When equipment malfunctions, issues can be addressed immediately by a qualified engineer. And what’s more, the quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability and false alarms. Although DIY security equipment is in principle very easy to install, it is still relatively new technology. Therefore, software and connection issues are likely to surface in the process of operating the equipment, which may undermine the performance of the system. Dealing with technical support that’s available only online or over the phone could be a daunting process and may not appeal to every consumer. Professional installers are usually located across numerous local offices, making an in-person interaction much more accessible and simple. The proportion of elderly people in economically developed countries is increasing. Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member. Moreover, in many cases these systems include individual monitors like personal emergency response systems (PERS) that can alert if a vulnerable person is in distress inside as well as outside the home. In addition to PERS, many service providers have been trialing programs that analyze the routines and behaviors of the elderly. This means that instead of an elderly patient needing to wear a pendant, his or her behavior is monitored passively by analytics software that alerts caregivers and…

Read More

Indian PSI Prepares for the Next Leap

(FICCI & PWC) The security industry is a large and expanding area of the economy with an estimated global market worth of USD 173 billion. The private security industry in India, valued at INR 570 billion is also promising. The Indian industry is still nascent and is likely to see exponential growth both in terms of manpower employed, and market share due to rapid infrastructural and economic development, leading to an increased need for prevention, detection and protection of assets and citizens against criminal acts such as fraud, terrorism, theft, drug-related offences and violent crimes. Yet another factor adding to the demand is the increase in individuals joining the billionaire league and seeking private protection at all times. The private security industry is one of the largest employers in India and is continuously growing. It is employing almost 8.5 million people and has the potential to employ 3 million more people by 2020. Manned guarding continues to be the service line with maximum employment and is also the highest revenue generator for the private security industry, contributing to 80 per cent of the revenue, followed by cash services. Government policies like making guards and installing CCTV cameras in schools, ATMs, and various other locations mandatory have also accelerated the demand of the industry in the country. With a high level of advancements in technology, services like electronic security services, integrated facility management, and security architecture and engineering will see greater prominence in the time to come. This not only has the potential to improve the quality of services offered by security companies but may also prove to be a boon for the large workforce who will have the opportunity to up-skill themselves and progress to engaging employment conditions. With the passage of time, security companies have evolved from servicing only homes and businesses to servicing the government. The rapid growth of the private security industry is both a refl ection of the inability of government security agencies to provide adequate security to private property and of the growing sophistication of the requirements of the private sector. In the context of current policy and regulatory developments in the country, the private security industry will continue to play an important role. More investments coming into manufacturing and other related industries will not only trigger the demand for private security personnel but also compel the industry to adopt processes and practices in sync with international standards. The contribution of this sector to employment generation in India is unique. Private security industry provides employment to a large number of rural youth, which otherwise would have remained outside the fold of formal employment. – Dr. Sanjaya Baru Secretary General, FICCI However, as per the industry sources, 60 per cent of the security service providers still operate as unorganised, thereby keeping the sector price oriented, and amenable to unfriendly employment practices that make it difficult to monitor quality and compliance. The sector continues to be perceived by the work force as non-aspirational as people are unaware of career prospects and the benefits that can be achieved. Technology integration is yet another challenge as it is widening the gap between the well-established players and smaller players in the industry. Most clients are now looking for technology-enabled security solutions which some of the bigger players in the industry already have; however, because of high capital and highly skilled manpower requirements, it is getting harder for smaller companies to keep up with the pace. Lack of quality manpower, high attrition rates and compliance requirements also continue to pose major challenges to the growth of the manned guarding security services market. Government policies are changing the game quickly with important decisions being taken to overcome challenges such as revision in foreign direct investment (FDI) rates, re-categorization of security workers and modification in the minimum wages. However, the industry stakeholders are still of the view that more changes at the policy level and improved enforcement could help private security grow further and make the sector more viable for investments. Some key suggestions are creating a grading framework for private security players in the market and having a single window licence process. Industry overview Considering the growing demand for security services, security firms in India are seeking capital to expand their business. Some international players are also foraying into India to tap the potential of the industry. Demographic characteristics India’s competitive advantage has been its competitive wage structure and availability of manpower. A large number of youth within the age group of 15–19 fall below the poverty line as they drop out of formal education and have limited avenues for employment – majorly in regions including Bihar, Uttar Pradesh, Jharkhand, Madhya Pradesh, Rajasthan and Assam. They come to cities in search of better employment opportunities. The youth from cities, though, associate with the security industry with low aspirational value owing to lack of social security schemes, long working hours and poor working conditions. Nevertheless, the private security industry continues to be one of the largest employers in India. Over 90 per cent of this workforce consists of security guards who are at the base of the pyramid, with little to no relevant experience or expertise. They resort to working as security guards as the last option. Recent policy initiatives FDI rates: FDI in private security agencies (PSAs) has been revised through the automatic route to 49 per cent and through the Government approval route to 74 per cent. Re-categorisation: In January 2017, vide a Gazette Notification, workers in private security have been re-categorized under the Minimum Wages Act, along with a modification in the minimum rate of daily pay. Security guards without arms have been recategorized as ‘skilled,’ and security guards with arms and security supervisors have been categorised as ‘highly skilled.’ Wage rate revision: The Central Government has also revised the minimum wage payable to employees of the ‘watch and ward’ sector to INR 637 per day effective April 2017. Stakeholders are of the opinion that more changes need to…

Read More