To seize the advantage of the high point of the Internet security security market

What are the advantages and disadvantages of traditional security companies in the face of the Internet of Things? What are the threats? How can security companies seize the opportunity and seize the market commanding height?

Advantage Analysis In the face of the Internet of Things security business opportunity, everyone has a dilemma: do not know where to cut in and how to enter?

The emergence of the concept of the Internet of Things is not a new concept falling out of the sky in a vacuum, but on the basis of the original information technology, due to scientific and technological progress, the information technology has achieved a new sublimation. If information technology does not reach a certain scale and level, it is impossible to talk about the realization of the Internet of Things.

The core technology of the Internet of Things is still at the stage of research and development, both domestically and internationally, and there are still a few distances from large-scale applications. The large-scale application of the Internet of Things mainly depends on whether consumers can admit its feasibility and whether it can use the Internet of Things to improve work efficiency and quality of life. Only really can solve the problems that the user must solve before they can push forward the development of the technology. If consumers cannot accept it, it will be difficult for the Internet of Things to form an industrial chain.

The advantage of the security industry is that the concept of the Internet of Things is not yet clear but it is against the Internet of Things framework. Security can solve local problems. Security, video, and GPS in security are the core technologies of the Internet of Things industry, and have been initially applied. We also need to increase the Internet of Things from ordinary sensing and transmission to an intelligent level. In particular, in the context of the “Safe City”, the installation of a large number of video equipment has formed front-end video perception, including the “Smart City” that has been upgraded in the future. Can not leave security equipment.

In the “Peace City” era, the security industry is targeted at special operations and is only partially interoperable and sharing. For example, in a public security system, a public security bureau or a traffic police detachment, he only implemented in his own administrative jurisdiction. The collection of information, including the application of some information. Because of such construction principles and guidelines, it leads to self-contained systems and it is difficult to communicate with each other. There are many systems in the Traffic Management Bureau. These systems are all independent. After construction, we can find that there are many and many cameras, there are many, many testing equipment. These devices may not be related to each other and belong to the same department, but they are not organic.

A common feature of security applications for industrial applications is that the construction ideas are vertical, that is to say, an industry or a user to define the principles of his construction, and thus have a strong pertinence in the collection and acquisition of image information. Lack of interoperability, interconnection, and intelligence analysis.

The "digital city" is the city planning, construction and operation management, including all aspects of the city's production and life, fully using digital information processing technology and network communication technology, integrating various information resources of the city and making full use of it, for the government office, The company's production and operation and residents' lives provide better services and facilities. The “Digital City” will gradually realize the up-and-down and horizontal interconnection of national, provincial, and municipal geographic information resources. It is basically built from a map (a basic scale map of the country’s basic scale) and a platform (a network (Global Positioning Satellite Integrated Services Network)). National Geographic Information Public Service Platform "" Digital China ". In the coming period, the state will select 30 to 50 cities each year to include digital city promotion plans, and strive to basically complete the construction of digital cities in prefecture-level cities and some county-level cities at the end of the “Twelfth Five-Year Plan” period.

Shenzhen Land and Resources Bureau completed the main project of the space platform and put it into trial operation in 2009. After more than one year of application and promotion, more than 30 government departments such as emergency command, environmental protection, and industry and commerce have successively passed the government affairs, external networks, and offline. Services, such as access platform for pilot applications, achieved initial application results. The space platform was formally opened, truly fulfilled the goal of providing basic geographic information services to the city, and successfully took the first step in the construction of “Digital Shenzhen”.

In the “digital city”, video surveillance plays an important role. It will serve as the “eye” of the city’s digital map, and will serve the government’s various departments systematically based on the information platform. In the past, video surveillance management software was aimed at a “small map”. Through “digital city” construction, all “eyes” were linked together and displayed on the “National Geographic Information Public Service Platform” large map, and video surveillance was also followed. Into the digital era, to meet the needs of the "digital city", so as to effectively solve the problem of information islands in the "Safe City" era.

The “Smart City” in the 21st century will be an upgraded version of the “Digital City”. Through the full use of information and communication technologies, it will sense, analyze and integrate key information of the core system of the city’s operations to include people’s livelihood, environmental protection, and Various needs, including public safety, urban services, and industrial and commercial activities, respond intelligently and create a better urban life for humanity.

"Smart City" has four characteristics: comprehensive connection, full integration, incentive innovation, and coordinated operation. Video surveillance is the “eye” of the entire smart city, and other various sensing devices are equivalent to the “spinal nerves” of the “smart city”. After the incident triggers the “nuclei of nerves”, the authenticity of the incident is confirmed through the eyes, and governments at all levels pass The information platform is processed quickly and accurately. Therefore, the security service has become one of the important services in the 49 services that South Korea's "Smart City" construction meets. Through the “Smart City” construction, Samsung SDS (consolidation of U-City+IT+Green's model concept, creating U-eco City) and LG CNS (proposes to promote the development of future livable cities such as health, safety, convenience, comfort and sustainability in cities (Policy), Posco ICT (a provider of services such as portals, security, medical, education, and integrated management and control, and planning services such as U-City business platform development).

In short, the security system products meet the three-tier architecture of the Internet of Things, the network layer and the application layer. The recent development of video intelligent analysis technology and high-definition video technology can fully reflect the characteristics of comprehensive sensing and intelligent processing of the Internet of Things. In the future construction of "digital city" and "smart city", its function is irreplaceable, regardless of how the market changes, there is a place for security technology and products.

Disadvantage analysis After the concept of IoT was introduced, in the field of informatization: related theories of sensor networks, IoT, M2M, ubiquitous networks, and smart earth have triggered people's heated discussions, and the presentation and development of the Internet of Things is essentially information. The inevitable result of the overall improvement of chemical technology will also inevitably lead to a new wave of informatization. There are many business opportunities under the tide. This is an opportunity created based on the integration of information technology development and the intersection of information technology.

In the era of Internet of Things security, traditional security companies will face competition with more information technology companies, including but not limited to informatization software companies, communication operators, broadcast and television operators, and various types of electronic related companies.

Compared with the enterprises that have started to intervene in the security industry, traditional security companies have the following disadvantages:

Weak technical base and lack of core technical support Early Chinese security companies sold products by acting as foreign agents. In the past 10 years, some security companies have gradually entered the manufacturing sector, but more often they have emerged in the form of product processing, especially the core Technology is basically controlled by foreign companies. Chinese manufacturing has become synonymous with processing plants.

However, looking back at the history of the development of the Chinese electronics industry, it seems that they have all gone through such a process: copying, development, and independent intellectual property rights. The small scale of the security industry, the shortage of technical talents, and the severe technical impact of the IT industry have determined that the road to independent intellectual property rights in the security industry has been a long one. However, facts have also proved that companies in the security industry with independent intellectual property rights have achieved better development.

The space for the security industry at the level of product application is very small, and as the product matures, the profits of product manufacturers have become thinner and thinner. Too low profits have prevented companies from investing more in technology research and development. The entire industry has formed a vicious circle: the technology of replication - the production of products - the price war. The final result is that there are many small businesses in the industry, and the threshold is low. It is very easy to be attacked by foreign companies. Technology has become a shortcoming for the development of security companies. There is no core technology to be a permanent pain for Chinese security product manufacturers.

In the initial stage of the concept of the Internet of Things, how security companies obtain the right to speak in technology is of great significance for security companies in the future.

The gap between the accumulation of primary capital is larger. The front end of security products is mainly sensor technology, the middle is the network transmission technology, and the terminal is the intelligent processing technology. Looking from the general direction, the investment for each technology is on the scale of hundreds of millions or even billions, and it is difficult for security companies to meet such requirements.

So, how to solve the funding problem? The author believes that it can be considered from the following aspects:

1. Through the capital operation, the introduction of the venture capital security industry is a rapidly developing industry that has attracted the attention of the capital market. The consolidation of the four security companies in November 2010 is a good news.

With the rise of the concept of security of the Internet of Things, security is faced with better opportunities for development. Venture capital will increase its focus on security and conduct guidance and listing for some powerful companies.

2. Applying for state and local government research funds to support the Internet of Things is a national strategy. Local governments have introduced various incentive policies. The security industry can fully rely on this shareholder's style to obtain government financial support.

3. Transformation of scientific and technological achievements and upgrading of technological level The Internet of Things has a wide range of technologies. Some scientific and technological achievements of universities and scientific research institutions in various regions are in urgent need of productization and marketization. It is a good idea to cooperate with universities in the absence of enterprises’ ability to build their own laboratories. the way. Cooperation can be a variety of ways such as technology investment or buyout technology.

The gap between marketing model and marketing level After years of development, IT and communications industries have trained a number of excellent marketing teams and formed a distinctive marketing model, such as the rental methods adopted by Digital China in the security industry.

Security products as industrial products, large marketing is one of the main marketing methods, in the past security companies contact level to the public security or security departments. Taking banks as an example, the security decision-making power of security products is mainly at the security departments of banks at all levels. With the expansion of the security industry, decision-making power is gradually being held by the presidents at all levels. In the early days of the bank's informationization process, communication companies mainly dealt with the president and the marketing level was significantly higher than that of the security industry.

In the past, the public security department had the decision-making power over some projects. Now it has gradually moved up to the government level. For example, Hikvision's $5 billion Ping An Chongqing project contract means that CLP-Twenty-two directly signed a contract with the Chongqing Municipal Government.

Therefore, this requires traditional security companies to better grasp the advantages of the enterprise in the tide of the Internet of Things, make up for disadvantages and deficiencies, grab market opportunities, establish the status of the industry, otherwise the company will face a new round of elimination. Opportunity to analyze the domestic traditional security market, it is difficult to meet the needs of the rapid growth of enterprises. However, the arrival of the Internet of Things era has provided enterprises with more market opportunities.

First, the concept of the Internet of Things will expand the new market of the security industry. The Internet of Things is currently in several areas of application, which will drive the intelligent demand of the industry. For example, shopping malls and supermarkets have invested in monitoring and alarm systems in terms of loss prevention. With the launch of the Internet of Things, customers' products will inevitably be upgraded. The traditional isolated security system needs to be integrated with the industry's information management system. The security industry will experience a high value-added market, which will increase the overall profitability of the security industry, thus stimulating enterprise R&D and creating a virtuous circle.

The Internet of Things companies invest in technology research and development, must be marketed, and the security industry has accumulated a large number of industry customers after years of development, and the security industry itself also needs more advanced technology applications. The marketization of IoT enterprise products is the quickest way to use the security industry channels. The cooperation between the two parties will enable IoT companies to recover their costs faster and obtain more venture capital.

Second: Internet of Things technology will drive the development of security technology In security systems, the large amount of data stored is video data. The storage space occupied by video data in the sensing system is the largest. Is the stored data useful? Both users and builders believe that most of such data are invalid data, and most of them will become information junk. How to solve this problem? In fact, this is what we need to describe the static features, dynamic features, and associated features of these goals, including other features, to standardize our current classification of data, some storage, and some mining. Classification and mining are the back-end computing functions as well as front-end or back-end intelligent analysis functions.

Intelligent analysis and software platform construction have always been shortcomings in the security industry. With the emergence of Internet of Things security, more security companies have entered the implementation phase from the concept stage, and even some companies have completed the development of applications for some industries. International security companies have started to acquire parts of software management platform companies. Future IoT security needs back-end smart technical support before it can be called a complete system.

Finally: Internet of Things applications can increase the value of security products. Security applications benefit from government promotion, but from the current actual results. More monitoring equipment is "afterwards", although it can increase the detection rate, but the characteristics of prevention are not obvious, resulting in many security equipment is more like furnishings. The Internet of Things application makes the security system more intelligent, more events truly prevent and control, and achieve a series of functions of pre-alarm, incident alarm, and after-examination.

The increase in the use of security products is conducive to the sustainable development of the security industry. On the one hand, security has become a necessity, which facilitates the formation of the security service market; on the one hand, it facilitates the transformation of security products from industrial products to consumer products and accelerates the marketization of security products.

The security field is very suitable for the realization of the Internet of Things landing field, security can provide a large enough experimental base for the Internet of things, but also can continue to do demonstration projects for the Internet of things.

The emergence of the Internet of Things can be regarded as the second spring of security. The Internet of Things is a conceptual platform for the security industry to develop intelligently. It can provide a better financial and technical platform for the development of intelligent security. For example, the security industry has been a short-board integrated management platform, and more large companies and large capital investment will accelerate this process.

Threat Analysis The high-speed development of the security industry is not only a good opportunity for traditional security companies, but also a good opportunity for other enterprises. In particular, operators and information system integrators have stepped in with their own technology, capital and market advantages. Security industry. After several years of testing, the company has gradually become familiar with the application mode of the security industry and has obtained a certain market share in the high-end market.

China Telecom is transformed from a traditional telecom operator to a comprehensive information service provider. Since 2004, the "Global Eye" of its Internet video technology has been used as an application of the Internet of Things. This technology has been widely used in dozens of industries and fields such as urban security monitoring, port monitoring, and Internet cafe monitoring. There are more than 160 cities in the country, and 300,000 monitoring points have been deployed. On this basis, some video intelligence has been tapped. Analysis and image recognition technology. "Global Eye" has also won the title of "National Independent Innovation Product" in the telecom operation industry. Many security manufacturers are trying to become suppliers of telecom platforms and they are optimistic about the sales volume of telecom platforms.

The initial application of the Internet of Things was mainly in the social informationization and industrial informatization application projects. The experience in system integration and information services is a blank point for traditional security companies. And more companies with these two basics may be involved in the security industry at any time. Just like telecommunications companies, they control high-end resources and traditional security companies can only become suppliers of products. For example, in the Safe City project, several large-scale system integrators have developed platform software and released standard protocols. All front-end product access platforms have to be tested. Security product manufacturers can only provide products by sacrificing prices and sacrificing profits.

In the education system, after the release of the National Education Exam Online Inspection System Standard, only a few companies have made a platform to meet the standards and achieved higher profits in the construction of the safe campus in 2010.

It is understood that many security companies have launched so-called industry solutions in recent years. Enterprises have realized the importance of vertical business in the information age. The security business has gradually merged with the industry informatization business, and the security products must be in compliance with such integration in order to get rid of the status of information islands. The enterprises with well-managed software management platforms have more say in the industry informationization. Therefore, the larger threats faced by traditional security companies are not giants like traditional operators, but system integration and industry information companies. After years of accumulation, these enterprises are familiar with the industry process, and video services are only equivalent to A module has been added to the industry information architecture, but for companies, it has added a new profit growth point.

In short, in the new round of competition, traditional security companies not only face fierce product competition within the circle, but also face the pressure of market invasion and division from the outside. The future profits of security product manufacturers will become lower and lower. After the industry information companies provide platforms, they can enter the product market at any time. Just like telecommunications, OEMs can improve their product lines through various channels.

The concluding remark "Policy First, Technology Leading, and Demand Driven" will become the main mode for the development of China's Internet of Things industry. Security products, as one of the important application products in the Internet of Things, have a vast market space. Therefore, security companies that are interested in entering the Internet of Things should seize this rare opportunity to follow suit and seize market heights.

Expandable Braided sleeving

Tianrui Fiberglass Composites Co., Ltd. , http://www.sdfiberglassmesh.com