Passing uid page to page

Secure. Protect. Improve.

Axis Solution Conference 2023

Axis Solution Conference 2023

A North Asia Tour

Secure. Protect. Improve.

AI-driven actionable insights with limitless possibilities

Marie-Helene Mansard

Director, Business Development
Axis APAC
Secure. Protect. Improve.
New priorities. New ways to create a smarter, safer world

In this presentation, we will share customer feedback on the trends and priorities for their implementation of security and safety system. The adoption of cloud technology, facilitated by 5G and AI, is prominent. Market demand emphasizes access management through mobile credentials and AI software. More integration and conversion services are required to support new implementation strategies. Yet, privacy and transparency concerns should be acknowledged for compliance. Cybersecurity remains a top priority to ensure business continuity and resilience. AI driven actionable insights become more widely used in video and audio analytics, with edge device analytics bringing strong real time performance. Axis remains dedicated to supporting customers across industries with enhanced compliance, security, and efficiency.

Leon Zou
Director
R&D, Axis China

Video and beyond: Actionable insights empowered by AI and edge analytics

With the increasing use of deep learning, cameras can now detect patterns, trends and anomalies. The combination of data from cameras – both visual and meta data – along with that from other sensors can be collated and analyzed; over time leading to insights that will result in operational efficiencies, safety enhancements and predictive maintenance.
Prof. CH Cheng
Director
Research & Technology Development of Logistics and Supply Chain MultiTech R&D Centre Limited
Creating a Smarter and Safer Hong Kong
In this presentation, we examine the technological strategies of LSCM aiming at making Hong Kong a smarter and safer city. We focus on the pivotal role of IoT sensing, and video analytics in this transformation. Exploring the intersections of technologies and infrastructures, we demonstrate how these technologies contribute to the overall development of Hong Kong through our example projects. By leveraging cutting-edge technologies and harnessing data-driven insights, our goal is to monitor complicated urban facilities and systems for operational effectiveness, efficiency, and safety.
Justin Kumulia
Business Development Manager
Intercoms and Access Control
Axis APAC

Access Control 3.0

Internet-based technological advances, together with increasing customer requirements for comfort, security, and privacy, mean that the way we access our homes and offices has undergone a fundamental change that will define industry standards and consumer expectations for years to come. Make sure you never compromise on quality and upholds the high standards of Access Control 3.0.

Steve Lee

Manager, Strategic Growth Initiative
Axis North Asia

The Power of ONE
Axis End-to-end solutions for surveillance

Discover the power of ONE as delivered by Axis End-to-end solution: one vendor, one interface, one point of support and one powerful design tools – a complete security system with ONE unified platform for simple and efficient design as well as management of surveillance.

Peter Ho
Technical Manager
Axis Hong Kong & Taiwan

The Power of ONE
Axis End-to-end solutions for surveillance

Discover the power of ONE as delivered by Axis End-to-end solution: one vendor, one interface, one point of support and one powerful design tools – a complete security system with ONE unified platform for simple and efficient design as well as management of surveillance.
Nelson Woo
Industry Associations and Standards Manager
Axis APAC

Securing better cybersecurity together

Cybersecurity is high on the agenda of every organization. In an increasingly connected world, any device connected to the network presents a potential cybersecurity risk, and a robust approach to reducing this exposure is essential. We will discuss how Axis supports cybersecurity and makes it easy and transparent for you to minimize risks while protecting privacy throughout the product lifecycle: from development and production to distribution, implementation to decommissioning.