Elmdene CCTV Cameras(3)
Browse CCTV Cameras
- Auto Iris
CCTV camera products updated recently
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The event is the opportunity to learn more about how products can be integrated with a broad range of complementary systems Integrated security manufacturer TDSi will be demonstrating the considerable benefits of full integration of its solutions with other specialist manufacturers, including Texecom, Milestone, ASSA ABLOY and SimonsVoss, on stand F1100, at IFSEC International 2015 this month. John Davies, Managing Director of TDSi commented, "IFSEC International is the perfect opportunity to learn more about how our products can be integrated with a broad range of complementary systems, from wireless locking systems to intruder alarms and CCTV VMS Platforms. All of these can be centrally administered by our EXgarde software, which provides a fully comprehensive, centrally managed security." TDSi to be a key part of 'Harmony Village' TDSi will again be a key part of the 'Harmony Village' at IFSEC International, which includes partners Texecom, GJD and Elmdene all in close proximity – making it simple for visitors to understand the connecting technologies. TDSi will also be working in close co-operation with Milestone, ASSA ABLOY and SimonsVoss at the show to explain the integration partnerships between the technologies and the providers. Distribution Partner Manager; LeAnne Hill, Channel Partner Manager; Alex Rumsey and Channel Partner Manager; Richard Hill will all be on hand on stand F1100 to discuss the benefits of working with TDSi in the UK. For international visitors attending the show, International Business Development Manager; Mica Negrilic will be available to talk about opportunities to partner TDSi in EMEA. John Davies will also be on hand to talk about the opportunities in China and the Asia Pacific region. Latest range of readers on display On stand F1100 TDSi will display its latest range of readers. These include new versions of its MIFARE and Proximity Readers, including MIFARE Plus and DESFire technologies, for added security and flexibility. Also on display will be the company's SOLOgarde, MICROgarde and EX-Series controllers, along with the combination options of its software products - including EXgarde security management and VUgarde Video Management Software. Motivational speakers This year IFSEC International features a number of well-known motivational speakers - including British racing driver and former track cyclist Sir Chris Hoy MBE, sporting executive Baroness Karren Brady CBE and Adventurer Sir Ranulph Fiennes OBE. TDSi is keen to encourage visitors from across the UK who may be considering attending the show. A recent blog (www.tdsi.co.uk/ifsec15_north) outlines the benefits of attending the show and also makes suggestions on the best ways to travel to the ExCel and to make the most of the event.
The BSIA-organised UK Pavilion the focal point of the highest-ever turnout of UK companies The Intersec exhibition held in Dubai last month is fast becoming a must attend event for British security providers. Members of the British Security Industry Association (BSIA) and its Export Council, who were there in force for the 17th year, report a high level of interest in the wide range of innovative UK security solutions, from integrated systems to access control, CCTV, perimeter protection, intruder alarm and power supply technology, on display. The scale of the British presence at Intersec 2015 was certainly impressive this time around, with the BSIA-organized UK Pavilion the focal point of the highest-ever turnout of UK companies. The positive experience of Export Council member companies at Intersec 2015 was captured by a post-event survey, with 75% of respondents answering that the number of visitors coming to their stands had grown year-on-year, paralleling what the organisers themselves have been saying. Beyond this, half of the member companies surveyed pointed out that the quality of attendees had improved - a welcome trend. Reflecting on the bottom-line business benefits, three-quarters said that they expect to obtain more orders thanks to Intersec and, looking ahead to 2016, all of the companies who replied confirmed that they were planning to attend next year's event. So what were visitors to Intersec 2015 most interested in? Well, security integration seems have been the hot topic, with all respondents to the BSIA's Export Council's post-show survey selecting it as one of the standout technology areas. This mirrors the findings of the BSIA's security and business trends research and underlines the increasing recognition amongst BSIA members’ customers of the enhanced security, and day-to-day management, benefits that can be unlocked when a number of elements from access control to video surveillance can be brought together in a seamless IP environment rather than remaining in their own discrete, and unconnected, silos. "From our members’ survey it is clear that not only was the number of on-stand visits on an upward trajectory but, crucially, there was a corresponding uplift in the level and quality of enquiries" Other technologies on the shopping list for Intersec 2015, according to the BSIA survey, included: HD (High Definition) CCTV and ultra HD in the form of 4K which continues to prove a popular choice thanks, undoubtedly, to the ability to provide additional detail in security critical applications such as banks and hotel lobbies and changing legislative requirements across the region. Beyond this video content analysis, biometrics for access control and ANPR were also in the frame. Commenting on Intersec 2015, Tom Sharrard, Vice Chair of the Export Council at the BSIA, is delighted with how the exhibition turned out for member companies: “Intersec 2015 certainly surpassed our expectations. From our members’ survey it is clear that not only was the number of on-stand visits on an upward trajectory but, crucially, there was a corresponding uplift in the level and quality of enquiries. It will, of course, be interesting to see how this translates into physical orders in the months ahead. There is little doubt that Intersec remains a strong platform for our members targeting the region, an area which appreciates the benefits of working with British businesses which offer best practice solutions that comply with the latest industry standards." Member companies were asked for their thoughts regarding Intersec 2015: Chris Williams, Director at VMS (Video Management Software) specialist Wavestore (www.wavestore.com) feels that the design of the UK Pavilion was particularly strong this year and was happy with the level of visitors: “The many visitors who attended on all three days delivered one of the best shows for some time.” A key focus for Wavestore was the energy saving capabilities of its V6 VMS which automates the spin down of hard drives not engaged in active read and write processes. Paul King, Commercial Director at Elmdene (www.elmdene.co.uk) reports that switch mode power supplies delivering efficiency levels of up to 90% were a big draw at Intersec, with leads up by 20%: “There was a lot of attention being given to our EN54 STX power supplies, high specification CCTV power supplies and PoE solutions,” says King. Natalie Simpson, Marketing Manager, Synectics (www.synecticsuk.com) says that the company's team at Intersec saw significant interest in integrated solutions and the EX camera station range, including thermal imaging. Reflecting on the bottom-line business benefits, three-quarters said that they expect to obtain more orders thanks to Intersec Another company whose solutions fitted-in with the market push for integration was TDSi (www.tdsi.co.uk), thanks to its powerful Exgarde access control software and VUgardeCCTV video management software. By the second day of the show, Managing Director John Davies was already pointing to an upward trend in attendees, a fact reflected in the company's final figures which rose by a fifth. Helen Williams, Marketing Executive at Remsdaq (www.remsdaq.com) says that the company secured record visitor numbers from across the Middle East and Africa: “We anticipate significant new business based on our multi-award winning EntroWatch and EntroStar access control products and the brand new EntroPad proximity reader with its unique Arabic keypad.” Tony Smith, Major Accounts and Marketing Manager at Integrated Design Ltd (IDL), renowned for its Fastlane turnstile solutions (www.fastlaneturnstiles.com), is also upbeat after a steady increase in visitors over the past few years. He reckons that the show is a good way to move existing business forward: “People from projects in the Gulf were able to come to see us for technical training and to look at the products they had purchased.” A member company using Intersec to show the shape of things to come was IndigoVision (www.indigovision.com) in the form of its FrontLine body worn video. Paul Murphy the company's Head of Marketing feels there is tremendous potential for the technology: “It has come to the point where it is durable and lightweight enough, and can record for long enough, for deployment by front line staff.” Users could range from staff at airports to those who are public-facing in hotels."
A long-term contributor to the BSIA’s Export Council, Ian’s expertise continues to help new exporters gain a foothold in overseas markets Following the British Security Industry Association’s AGM, Elmdene Ltd’s Managing Director, Ian Moore, has been appointed Chairman of the Association’s dedicated Export Council. With an export career spanning 20 years, Ian has made a positive contribution to the international growth of a number of businesses cross-nationally; working in the UK, Taiwan, Dubai and Libya. As Managing Director at Elmdene, a large-scale manufacturer of electronic products, Ian has in-depth experience exporting worldwide. Most notably to Germany, France, Italy, Spain, Nordics, South Africa and the Middle East. Ian has also honed his thought leadership skills throughout his professional development; from teaching at the Royal Navy Engineering University near the start of his career to later lecturing at the National Police College in Taiwan. In 2003, Ian established Detector Technologies and oversaw the company’s growth from a start-up to an international business with offices in the UK, Australia, Dubai and South Africa in just six years. A long-term contributor to the BSIA’s Export Council, Ian’s expertise continues to help new exporters gain a foothold in overseas markets. In recognition of his ongoing involvement in the Council, Ian was also recently awarded the Chairman’s Award for Contribution to Exporting at the BSIA’s Annual Lunch. Ian is looking forward to his new role and is ambitious about the future of the Export Council. When asked what his main focus as Chairman over the next twelve months will be, he replied: “I am very keen to educate members through the Council of the opportunities and risks of exporting. There is a natural assumption that exporting should be the first strategy to growing business – this is not necessarily true. Only when the home market is near to saturation (unless there is an unquestioning opportunity) and they have the products and market acceptance, should they go down this route. “Many British companies have products that will only sell into regions that are discerning about quality, innovation, compliance etc. With the extra price tag that this normally brings (including the amortisation of self and third party approving) – they will not normally be competitive when it is purely about price. In addition I want to emphasise the value the Export Council can give to its members and prospective members.” The BSIA’s Export Council, which celebrates its 20th anniversary this year, is a forum which allows relationships between the UK's security industry and overseas buyers to be founded and cultivated, and acts as an invaluable port of call for overseas-based contacts interested in developing a relationship with a UK company as a partner, customer or distributor.
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
- Bosch safeguards Basingstoke and Deane Borough Council with its DICENTIS conference system
- Kutch manufacturing firm eliminates data spoofing with Matrix Weighbridge integration solution
- Synectics secures Nottingham Trent University with its enhanced surveillance solution
- Intelligent video analytics plays a vital role in securing power grids and substations