AxxonSoft Access control systems & kits(1)
AxxonSoft releases new version of Axxon Intellect integration modules for access control, fire/security alarms, and perimeter security systems. Priority in this release has gone to increasing system functionality and addressing shortcomings as requested by AxxonSoft partners and clients. New features and improvements Unipos 7000 interactive fire protection has been completely redesigned: System stability has been improved. Information exchange between systems has been sped up considerably, improving alarm reaction times (in case of fires, faults, etc). New reactions have been added for events from the interactive map, enabling smarter hardware use. Improvements in OPC Wrapper integration module: Previously, when configuring the integration module it was possible to connect only to an OPC server on the LAN. Now it is possible to connect to any server inside or outside the LAN. DA elements are now better handled: simple rules can be configured for changing the status of an element and map indicator when an element takes on a certain value. Visualization of DA elements has been added: now the map can display symbols for elements, indicators of element status, and element values (in text form). Values of elements can now be changed from the map. Map interaction has been improved. Improved integration with the NCG9 sensor/relay network controller: Controllers now receive signals about the current status of a security system directly from inputs/outputs: nominal events (such as "Relay on/off") are now recorded in real time. Integration of new hardware Integration with the Siemens Cerberus ECO fire safety system has been added. Thanks to integration of video surveillance and fire alarms, false alarms can be avoided more effectively. Intellect also allows performing high-quality hardware monitoring by correlating alarms with surveillance footage. Almost all tasks for configuring fire safety systems can be accomplished through simple programming, which significantly eases operator tasks. Integration has been added with the Virtual Access Server module. This module allows creating virtual access points (without access control hardware) based on recognition of faces and license plates. This integration allows improving site access control without the high expenses associated with traditional ACS. Virtual access points are especially valuable for sensitive sites such as banks and munitions plants. Another important venue for this feature is hospitality facilities, such as casinos, hotels, restaurants, etc., for use in automatic visitor identification. Virtual Access Servers can also serve as a bridge between Auto Intellect/Face Intellect and the Time and Attendance module. Businesses can automate time and attendance recordkeeping – employee "signin" occurs when the employee is recorded by the security system. Integration has been added with the FoxSec access control system, which is designed for solving nearly all tasks related to building ingress/egress: rights and restrictions on access to zones and areas, monitoring of employee movement at a site, tracking of time worked, and more. FoxSec can import a database of hardware (object tree) and users if the site configuration has been previously changed in software. This simplifies installation of the security system and minimizes the expenses associated with new hardware. Integration with AnsonDB has been added. Integration with TELSAP 2000/2100 has been added. A number of minor errors have been fixed and overall stability of the product has been improved. Improvements to documentation have been made as well.Add to Compare
Browse Access control systems & kits
Access control system products updated recently
Gallagher 2 Door Kit - PoE+ for distributed one to two door access control using an Ethernet connection
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What is ethical consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favouredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoured, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labour issues and manufacturing practices that take these factors into account. Increase in ethical consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centres around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact on physical security products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating tech-specific threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behaviour, respect for stakeholder interests, respect for rule of law, respect for international norms of behaviour and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not buying products vulnerable to cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behaviour.
AxxonSoft, a developer of intelligent VMS and PSIM software, is proud to present Axxon Next VMS version 4.3.2. The new version introduces new capabilities in video analytics and smart forensic search, integration of multiple camera feeds into a single panoramic view, centralised server management for maintenance and updates, as well as many other enhancements and improvements. Added Queue Length and Visitor Counter detection tools. The Queue Length detection tool counts visitors within a designated area and notifies the system when the limit is exceeded. The Visitor Counter counts visitors entering and exiting a specific area. Both detection tools are targeted at the retail industry. They provide accurate estimates of traffic in stores and sales areas and enable effective management of POS staff. Smoke video detection Support for handling metadata from ANPR cameras was added as well Support for handling metadata (recognised license plates) from ANPR cameras was added as well. This makes it possible to reduce the server load while searching in Video Footage by license plate numbers. That means you can use more cameras per server. AI-powered fire and smoke video detection tools now use dedicated neural networks for each type of hardware (CPU, GPU, and Intel® Movidius™ VPU) for increased performance. MomentQuest is now available through a web client that comes even closer to desktop software. The MomentQuest smart forensic search system performs real-time scene analysis and generates a stream of metadata – a lean description of moving objects within the scene – which is recorded along with video stream. Retrieving recorded footage To retrieve recorded footage of an event of interest, you just need to enter specific criteria: motion in area(s), crossing of a line, object colour or size etc. Within seconds the system displays relevant video thumbnails, which makes it truly interactive. Also, you can now use saved MomentQuest search criteria on any other camera channel. You can zoom in on a portion of the panoramic view to display it in a separate tile The newly introduced FrameMerge function ensures much more convenient and efficient coverage of wide areas, such as sports arenas, airports and seaports, warehouses, production facilities, and public spaces. FrameMerge stitches video feeds from adjacent cameras into a single panorama which can be viewed in real time, played back from Video Footage, or exported. You can zoom in on a portion of the panoramic view to display it in a separate tile. Integrated video image The panoramic view is stitched automatically - the algorithm scans images from adjacent cameras for appropriate stitching points and matches these points in the integrated video image. The Failover Service is sufficiently improved. You can now suspend any server in the cluster with no system downtime, e.g. for maintenance. The configuration of the suspended server will be automatically transferred to the backup server and restored when the server is restarted. All servers within the cluster can now be updated with a single distribution package or a link to a file on the network. This approach makes system updates a breeze.
The Malaysia government water treatment plant envisions providing the best water treatment with demand of high security protection in the industry sector. Furthermore, the highly reliable platform with flexibility to expand storage by year and budget becomes important criterions to select the ideal surveillance partner. Surveon NVR7800 ensures high video image quality with high throughput capability, in addition to flexible JBOD storage expansion capability. Surveon NVR7800 Series Surveon NVR7800 Series was designed as a recording server with an archiving function Price and performance are always the key elements to help Surveon to win projects. Surveon NVR7800 Series was designed as a recording server with an archiving function that offers multiple advantages compared to traditional system structures composed of recording server plus a separate storage device, making it the top choice for the water treatment plant. The big scale industrial plant installs 50 to 100 cameras at each site in demand of high image quality. The plant needs a reliable system that supports recording with hundred channels and is able to transmit high resolution images smoothly. The NVR7800 Series delivers a high level of recording throughput of nearly 2000 Mbps, supporting recording with more channels, allowing system to receive better video image quality by higher bitrates, and ensuring smooth transmission even with high frame rate. Compatible with 3rd party VMS Support up to 316 drives with high density 4U 60-bay expansion enclosure (maximum capacity of up to 3.6 PB with 10TB HDD). It supports to expand storage through JBOD by year, timeline and budget with best flexibility. This provides the government owned plant to expand facilities by year, timeline and budget. The water treatment plant prefers a solution which is fully compatible with Axxonsoft VMS. The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone, Genetec and Axxonsoft VMS with certification. Supports multiple network cameras Based on Milestone test findings, NVR7800 Series supports up to 150 cameras Based on Milestone test findings, NVR7800 Series supports up to 150 cameras, more than twice Milestone’s benchmark level in a non-stop recording scenario. The system is even capable of supporting more than four times the number of cameras estimated by benchmark under the testing scenario where motion detection is enabled, giving medium to large projects the best price-performance solution. "The hybrid server-storage design of NVR7800 Series gives us the best C/P value candidate. The enterprise level RAID engine enables highest level data protection with RAID 1+Spare, 5+Spare, 6+Spare technology to support robust data protection even with HDD error. Further, the flexibility to connect JBOD provides the high flexibility to extend recording time base on project demand. We are very satisfied with the result and look forward to working with Surveon next time." said the administration manager of the water treatment plant.
Hikvision, the global supplier of innovative security products and solutions, will be exhibiting its latest innovations at Intersec 2019, the largest security exhibition in the Middle East, January 20th – 22nd in Dubai, UAE. “As the largest and most prestigious security surveillance industry exhibition in the Middle East and North Africa Regions, Intersec is an event where Hikvision mobilises significant resources every year to engage with customers and partners,” says Binson Xu, the regional president of Hikvision MENA. “The 2019 edition of Intersec marks the 10th year of Hikvision’s participation in this great event, a significant milestone for us.” Demonstrating AI powered solutions Hikvision Smart Retail Solution enables retailers to get an understanding of their business’s status using intelligent cameras, NVRs, and the VMS, HikCentralAt the booth, visitors can experience Hikvision’s market-leading products, solutions, and services across various industries and scenarios. There will be interactive areas for visitors to immerse themselves in an Artificial Intelligence experience and feel the power of AI technology. Hikvision will demonstrate AI industry solutions for vertical markets and applications. For example, Hikvision Smart Retail Solution enables retailers to get a clear understanding of their business’s status using intelligent cameras, NVRs, and the video management system, HikCentral. Visitors will also be able to see a sand box at the booth, demonstrating how Hikvision's Intelligent Traffic System (ITS) recognises vehicle license plates to manage roadway traffic and parking areas. Turnstile with face recognition terminal In addition, the booth will feature a building access control simulation with facial recognition technology. Visitors can pass through an access turnstile equipped with Hikvision’s face recognition terminal after registering at the reception. Meanwhile, a people-counting camera set above the crossbeam provides real-time monitoring, so visitors can experience this powerful technology first-hand. Hikvision will also showcase intelligent products, including AI-equipped Turbo HD 5.0 cameras, the Easy IP 4.0 Series with Hikvision’s AcuSense and ColorVu technologies and the DeepinView deep learning cameras. Hosting technology partners Visitors will be able to see a wide range of innovations and products for new Hikvision enterprises, such as smart home, industrial automationAt Intersec, Hikvision will host several technology partners at the booth, including AxxonSoft, Ela-soft, Milestone Systems, Nedap, Seagate, and Western Digital. Representatives of each of these partners will be available to talk with visitors about how their solutions integrate with and complement Hikvision products and technologies. Visitors will also be able to see a wide range of innovations and products for new Hikvision enterprises, such as smart home (under the EZVIZ brand), industrial automation (Hik Robotics), Automotive Electronics, Intelligent Data Storage, and more. Visit Hikvision at Booth SA-B12 to explore additional information and opportunities.
Physical security supports a future-proof cyber security strategyDownload
Combining systems intelligence and human insight for superior securityDownload
Three reasons for adopting open architecture access control solutionsDownload
Keyzapp management system installed by Amthal Fire & Security at head offices for property protection
- Keyzapp management system installed by Amthal Fire & Security at head offices for property protection
- Airbus provided state-of-the-art communication solutions to secure the G7 meeting at Biarritz
- ANSecurity helps in Secure Access platform upgradation for South Hams District Council and West Devon Borough Council
- Allegion announces Schlage AD electronic locks and NDE networked wireless locks support contactless student IDs in Apple Wallet