Avigilon Access control systems & kits(25)
Networked, Card Swipe, 500,000 cardholders, 5 ~ 35 C (41 ~ 95 F), 20 ~ 80, 100 ~ 240 V AC, 315 W, 29 x 9 x 31 , 6,000, Linux, OpenLDAP, VMware Ready, VerAfied, Firefox, Google Chrome, Apple Safari, Internet ExplorerAdd to Compare
Networked, Card Swipe, 500,000 cardholders, 10 ~ 35 C (50 ~ 95 F), 20 ~ 80, 90 ~ 264 V AC, 250 W, 42 x 434 x 394, 8,050, Linux, OpenLDAP, VMware Ready, VerAfied, Firefox, Google Chrome, Apple Safari, Internet ExplorerAdd to Compare
Browse Access control systems & kits
Access control system products updated recently
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What is ethical consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favouredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoured, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labour issues and manufacturing practices that take these factors into account. Increase in ethical consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centres around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact on physical security products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating tech-specific threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behaviour, respect for stakeholder interests, respect for rule of law, respect for international norms of behaviour and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not buying products vulnerable to cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behaviour.
Avigilon Corporation (Avigilon), a Motorola Solutions company, announces the release of the Avigilon Access Control Manager (ACM) 6 system. ACM™ 6 introduces a new model for ordering and delivering end-customer licenses by simplifying how they are issued, distributed and managed. This new process will have customers up and running faster, helping to increase efficiencies. ACM 6 promotes ease of deployment by including default door and wiring templates, support for large card formats and extended support for Mercury controllers. New Concept For Managing Access Control The unification feature of ACM and ACC™ leverages the power of Avigilon Appearance Search™ technology The ACM system integrates with the Avigilon Control Center (ACC) video management software seamlessly, allowing users to search for a person using their ACM cardholder information to view video clips of related door activity. The unification feature of ACM and ACC™ leverages the power of Avigilon Appearance Search™ technology, which makes it possible to search for a person of interest based on their identity name directly from the ACC interface. This allows customers to secure their facility faster and more efficiently. Avigilon launches new concept for managing access control that offers streamlined ordering and licensing delivery system. “The ACM system is transformational in its ability to integrate with ACC software, offering users a seamless solution for both video security and access control,” said John Kedzierski, senior vice president, Video Security Solutions at Motorola Solutions. “Combined with greater licensing flexibility, this unification makes ACM a streamlined solution to meet the needs of our customers and end-users.”
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organisers – bluntly suggest that healthy scepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command centre. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at colour-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking", and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model”, said Ree. Video is analysed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritise feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasises the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From scepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
Avigilon Corporation, a Motorola Solutions company, has announced the launch of its Avigilon H5SL camera line. H5SL camera The H5SL camera is simple and intuitive to install, with a modular design that easily snaps into a variety of base options, helping users to get up and running in minutes. End-users have the flexibility to choose from various lens types, including a new long-range lens that allows them to see with more clarity at farther distances, while audio and input and output connections help them configure actions and alarms for efficient event response. Patented HDSM SmartCodec technology Patented HDSM SmartCodec technology saves on both storage and network bandwidth, helping keep internet connectivity costs down. American-made, built with North American expertise and globally sourced materials, Avigilon stands behind the quality of its H5SL cameras with a 5-year, industry-leading warranty. The H5SL camera line also incorporates Avigilon Unusual Motion Detection “We built our H5SL camera to create a versatile and cost-effective security solution for our customers,” said John Kedzierski, senior vice president, Video Security Solutions at Motorola Solutions. “With value and simplicity at the heart of this camera line, our customers will enjoy the ease of installation, flexible design features and various lens options the H5SL offers them.” Avigilon Unusual Motion Detection The H5SL camera line also incorporates Avigilon Unusual Motion Detection, an advanced artificial intelligence technology that can be used to notify operators of unusual events that might otherwise have been missed, helping to improve situational awareness and effectively monitor more cameras. The H5SL is offered in 1.3, 2, 3 and 5 MP resolution models and is now available for order. For more information on product availability, customers can come see the live product demonstration at GSX 2019, Booth #723 from September 10 to 12 at McCormick Place in Chicago, USA.
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- Interflex security system streamlines access control, security of staff at Casino Baden-Baden
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- 3xLOGIC infinias access control system secures Las Vegas marijuana facility
- ASSA ABLOY’s SMARTair swaps manual keys for centralised electronic access control at Westbridge