Bosch CCTV Cameras(141)
DINION is a completely new camera family from Bosch Security Systems (formerly Philips CSI) that provides superb pictures right out of the box at very attractive prices. Combining smart operation functions to reduce installation time with performance features: NightSense - automatically switches to higher sensitivity at night Auto-black - boosts contrast in low visibility or fog Colour fidelity - improves colour reproduction Lens Wizard - automatically detects lens type and optimises performance Fully compatible with most other video equipment New stylish shape for an ultra-modern look On-screen menu for easy set-up Available pre-configured for outdoor/indoor use for faster installation Other - backlight compensation, colour temperature tuning and auto-aperture correction Available in a choice of 4 colour and 4 mono versions in high or standard resolution, operating from 220 /110V AC or 12/24VDC for maximum flexibility. The DINION range is backed by a comprehensive 3-year warranty.Add to Compare
1/2 inch, Colour / Monochrome, 540 TVL resolution, Digital (DSP), Auto Iris, Direct Drive, 0.0024 lux, 12 V DC, CS mount, 4 ~ 144, 752 x 582, Back Light Compensation, Auto Gain Control, 1/50 ~ 1/500,000, > 50, Internal/Line-lock, PAL/NTSC, 1.0 Vp-p, 75 Ohms, 350 mA, 58 x 66 x 122, 450, -20 ~ +55, 20 ~ 93Add to Compare
The first Dinion cameras from Bosch set a new benchmark for high picture quality and ease of set-up. The new DinionXF cameras surpass even that by delivering even higher picture quality and more detail – thanks to its 15 bit video processing.Other features include: Fast automatic set-up for easy installation Optional Bosch ‘Bilinx’ system allows remote set-up over the video coax cable – with no extra wiring required Higher sensitivity and sharper images More detail in both the high-light and low-light areas Built-in global scene change detector automatically adjusts to changing light conditions (switching on security lights etc, sun etc) Lens wizard automatically detects the lens type for quick automatic set-up and accurate focus 24 hours a day Monochrome or colour versions with extra NightSense for enhanced night viewing Video motion detection using 4 independently programmable areas Alarms displayed on-screen or used to activate alarm outputs Up to 3 programmable operating modes with easy switching between them – e.g. for day, night or alarm conditions Programmable backlight compensation handles even the most difficult lighting conditionsAdd to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, Digital (DSP), Auto Iris, Direct Drive, 0.018 lux, 230 V AC, C/CS mount, Motion Activated, 752 x 582, Back Light Compensation, White Balance, 50, Line-Lock, PAL, Compact, 1.0 Vp-p, 75 Ohms, 4 W, 58 x 66 x 122, 450, -20 ~ +50, 5 ~ 93Add to Compare
At IFSEC 2005, Bosch Security Systems displayed two new Day/Night versions of its high-performance, 15-bit DSP DinionXF range. For round-the-clock surveillance, the DinionXF Day/Night versions feature a built-in infrared filter for daylight surveillance that automatically moves from in front of the lens when the light level falls below a present value (at night infrared is the most useful region of the electromagnetic spectrum for imaging). For night-time surveillance, the camera also automatically switches to monochrome mode to increase sensitivity. The DinionXF Day/Night versions have built-in, through-the-lens infrared metering and detection that prevent reversion to daylight mode if the camera is illuminated by an infrared source at night. The IR filter can also be switched manually via the alarm input, through the camera menu or via the Bilinx coaxial bi-directional control interface. The new cameras also feature SensUp that dramatically enhances the effective sensitivity by decoupling image accumulation from the video output and by increasing accumulation time on the CCD up to ten times. Bosch’s SensUp works with continuous shutter speed adjustment for the smoothest possible video level control. SensUp is most effective where the only light is from the moon, stars and scattered radiation. Enhanced night-time imaging guarantees round-the-clock surveillance Lens Wizard automatically detects lens type and sets focus for 24-hour cycle Video Motion Detection allows selection of four fully programmable areas XF-Dynamic feature extends dynamic range for outstanding image quality CCD imaging and DSP technologies enable best possible sensitivityAdd to Compare
1/3 inch, True Day / Night, 720 TVL resolution, Digital (DSP), Auto Iris, 0 lux, 24 V AC / 12 V DC, Infrared, Motion Activated, 2.8 ~ 12, Bracket, Wide Dynamic Range, 1020 x 596, Back Light Compensation, White Balance, 1/50 ~ 1/10,000, > 50, Internal, Line Lock, PAL, Composite video 1 Vpp, 75 ohm, 430 mA, 70 x 120, 960, -30 ~ +50 C (-22 ~ +122 F), IP66, IK08, 20 ~ 90Add to Compare
1/3 inch, True Day / Night, 720 TVL resolution, Digital (DSP), 0 lux, 12 V DC, Infrared, 3.6, Bracket, Wide Dynamic Range, 1020 x 596 (PAL), 1020 x 508 (NTSC), 1/50 ~ 1/10,000 (PAL), 1/60 ~ 1/10,000 (NTSC), > 50, Internal, NTSC/PAL, Composite video 1 Vpp, 75 ohm, 370 mA, 59 x 85, 540, -30 ~ +50 C (-22 ~ +122 F), IP66, IK08, 20 ~ 90Add to Compare
The new Dinion Infrared Imager from Bosch overcomes all the challenges posed by critical infrastructure surveillance. Capable of providing up to 160m (525ft) of detection level surveillance and 120m (390ft) of classification level surveillance in total darkness at night, the camera is ideal for installation along a fenceline or perimeter. All Dinion Infrared Imager cameras are tested to DCRI standard surveillance levels - Detection, Classification, Recognition and Identification of target - to ensure reliable performance at the stated distances. Unrivalled image qualityPoor lighting conditions can prevent effective 24/7 perimeter surveillance. The Dinion Infrared Imager combines 2X-Dynamic technology for 20-bit processing and wide dynamic range with our advanced infrared technology in a single, robust outdoor unit to deliver unmatched image quality night and day. Our innovative 3D Diffuser infrared technology balances scene foreground and background for perfectly evenly illuminated night-time images. Unique Constant Light technology automatically compensates for naturally-occurring LED degradation to ensure a consistent level of lighting performance for the life of the camera. New Variable Field Illumination reduces installation time and delivers total flexibility, by allowing you to easily adjust IR intensity and beam patterns on-site. Easy installationA quick connect system between the camera and mount makes it quick and easy to install. The camera can be fully configured without exposure to the elements, an integrated on-screen display with remote capabilities provides a single interface for controlling most infrared and camera functions. Advanced intelligenceNeed help detecting loitering, line crossing and other potential threats? Embedded Intelligent Video Analysis (IVA) processes video signals and alerts operators to potential security threats, allowing the camera to function as a reliable, automated fence-line detection appliance. Install and forgetThe unit is rated to IP67 and NEMA4X for corrosion resistance and tested to desert solar radiation conditions, shock and vibration. It is designed to stay securely in place even through hurricane-force winds. The Dinion Infrared Imager overcomes all the challenges posed by perimeter, border and general monitoring surveillance at critical infrastructure sites to deliver round-the-clock protection you can rely on. //Add to Compare
Bosch Security Systems has won the NSCA’s 2005 Innovations in Technology award in the Security/Fire/Life Safety category. Bosch was one of only three finalists and won the award for the highly innovative mechanically-switchable IR filter featured in its high-performance LTC 0495 and LTC 0620 DinionXF Digital CCD Day/Night Cameras. The IR filter, which is automatically removed when the light level falls below a preset value, ensures the highest image quality, even under poor lighting conditions, day or night. For night-time surveillance, the camera also automatically switches to monochrome mode to increase sensitivity.The advanced technology of the 1/3-inch LTC 0495 and LTC 0620 Digital CCD Day/Night Cameras guarantees around-the clock surveillance, making the camera ideal for high-security areas including public utilities, prisons, and banks, as well as for situations where identification and image detail are critical, such as in retail stores. Over 100 companies entered products for consideration in this year’s Innovations in Technology Award Program, held at the Systems Integration Expo, Orlando, FL. Finalists were selected by a panel of judges, and then voted on by Expo attendees to determine the winner of each category.The National Systems Contractors Association (NSCA) is the leading non-profit association representing the commercial electronic systems industry, and has more than 2,500 member companies worldwide.Add to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, 0.040 lux, 12 V DC / 24 V AC, C/CS mount, 752 x 582, Back Light Compensation, White Balance, 1/50 ~ 1/125,000 sec, 50, AC Line-lock, Compact, Composite video 1 Vpp, 75 Ohm, 4 W, 58 x 66 x 122, 450, -20 ~ 50, 5 ~ 93Add to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, Digital (DSP), 0.006 lux, 12 V DC / 24 V AC , Infrared, 5 ~ 50, Wide Dynamic Range, 752 x 582, Back Light Compensation, Auto Gain Control, White Balance, 50, Internal, Line Lock, PAL, Composite video 1 Vpp, 75 ohm, 381 x 114 x 114, 6,400, -50 ~ 60, IP67, 0 ~ 100Add to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, Digital (DSP), Auto Iris, Direct Drive, 0.018 lux, 12 V DC, C/CS mount, 752 x 582, Back Light Compensation, White Balance, 50, Line-Lock, PAL, Compact, BNC, 4 W, 58 x 66 x 122, 450, -20 ~ +50, 5 ~ 93Add to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, Digital (DSP), Auto Iris, Direct Drive, 0 lux, 12 V DC / 24 V AC , Infrared, 5 ~ 50, Auto Gain Control, 0.45, >48, NTSC, 1 Vp-p, 75 Ohms, 4.5 W, 89 x 91 x 222, 1,400, -50 ~ +65, IP66Add to Compare
1/3 inch, Colour / Monochrome, 520 TVL resolution, Digital (DSP), Auto Iris, Direct Drive, 0.0 lux, 12 V DC / 24 V AC , Infrared, 4 ~ 8, 768 x 494, 0.45, 1/60 ~ 1/100,000, 48, NTSC, Composite video 1.0 Vp-p, 75 ohm, 700 mA, 60 x 145, 560, -30 ~ +55, IP67Add to Compare
1/3 inch, True Day / Night, 720 TVL resolution, Digital (DSP), Auto Iris, 0.02 lux, 24 V AC / 12 V DC, Motion Activated, 2.8 ~ 12, Bracket, Wide Dynamic Range, 1020 x 596, Back Light Compensation, White Balance, 1/50 ~ 1/10,000, > 50, Internal, Line Lock, PAL, Composite video 1 Vpp, 75 ohm, 190 mA, 70 x 120, 960, -30 ~ +50 C (-22 ~ +122 F), IP66, IK08, 20 ~ 90Add to Compare
1/3 inch, True Day / Night, 720 TVL resolution, Digital (DSP), 0.002 lux, 24 V AC / 12 V DC, HD, CS mount, Motion Activated, Wide Dynamic Range, 1020 x 596, Back Light Compensation, Auto Gain Control, White Balance, 1/50 [1/60] ~ 1/100000, > 54, Internal, Line Lock, PAL, Zoom, Composite video 1 Vpp, 75 ohm, 330 mA, 58 x 66 x 122, 600, -20 ~ +55 C (-4 ~ +131 F), 20 ~ 93Add to Compare
1/4 inch, Colour / Monochrome, 550 TVL resolution, Auto Iris, 0.1 lux, 18 V AC, Thermal, wall, Wide Dynamic Range, 752 x 582, White Balance, 1/1 to 1/10,000 seconds, >50, PAL, NTSC, Zoom, 1.0 Vp-p, 75 Ohm, 36 VA, 267 x 452 x 201, 10660, -40 ~ +60, IP68, 0-100Add to Compare
Browse CCTV Cameras
- Auto Iris
CCTV camera products updated recently
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
The Open Security & Safety Alliance (OSSA), an industry body comprised of leaders, influencers and innovative organisations from all facets within the security, safety and building automation space, celebrates its one-year anniversary. Within its first 12 months, OSSA attracted 30+ members ranging from device manufacturers, software developers and system integrators to distributors and system on a chip (SoC) companies – helping lay the groundwork for improved security, safety, building automation and business intelligence solutions. Open security and safety ecosystem We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem" “Through OSSA, we have competing and complementary institutions reaching across aisles and stepping outside of their brands to work together to push our whole industry into a new, more prosperous and efficient direction,” said Johan Jubbega, President, Open Security & Safety Alliance. “We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem comprised of 30+ renown companies, and having a market-changing digital marketplace and first commercially available video security camera offerings underway for year two as the Alliance continues to provide guidance and interpretation of common standards and specifications to promote more intelligent, productive solutions for users.” Operation and maintenance of products Currently, security and safety solutions are fragmented and there is no collaborative approach to systems working together for bigger-picture success. Large amounts of data are left untapped in siloed systems that through cooperation can instead be utilised for better living, safety and security purposes. OSSA’s mission is to work with market players to all start from the same ‘recipe’ when it comes to the development, deployment, operation and maintenance of products, software and services. The Alliance’s vision is that the majority of the security and safety industry works with a common, vendor-agnostic operating system (OS) and IoT infrastructure – and agrees to implement or adhere to common approaches defined for common challenges like data security, privacy, product performance and easy consumption of data across multiple solutions. Collaborative digital marketplace They also started to define the common approaches and establishment of a shared IoT infrastructure This will substantially fuel usability and trust when it comes to security and safety solutions that are built on the foundations set forth by OSSA. From there, companies can differentiate through apps by way of a collaborative digital marketplace – similar to how we all access/download/use applications between an app store and our smart phones and other digital devices. Already within its first year, OSSA member companies created the first common Technology Stack specification including the definition of a common operating system for video security devices. They also started to define the common approaches and establishment of a shared IoT infrastructure, including a digital marketplace. This framework allows the trapped – and mostly unused – data captured by any brand of device to be unleashed and available for good purpose. It also reduces friction when conceiving, deploying and maintaining security and safety devices, systems and settings and inspires innovation by opening the doors to data interpretation and possibilities. This platform revolution that OSSA envisions will benefit everyone involved. Significant outputs from Alliance workgroups Significant outputs from Alliance workgroups over the past 12 months include: Documentation of a common Technology Stack including the definition of a common vendor-agnostic OS. First description of a common market approach to data security and privacy. OSSA member Security and Safety Things GmbH (SAST) realised a first version of its OS as set forth in the common Technology Stack defined by OSSA – enabling the creation of prototype cameras. Together with SAST’s first open app store for security cameras, various innovative applications were showcased this year from ISC West 2019, IFSEC 2019 and GSX 2019. The commercial launch of the platform is planned for Q1 2020. OSSA members fulfilled their first prototype cameras based on the commonly defined Technology Stack and OS, and showcased them throughout 2019 at ISC West, IFSEC and last week from GSX. Change for the betterment of the industry The Open Security & Safety Alliance’s five founding companies – Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ and VIVOTEK Inc – are joined by 25+ other inventive international players that currently comprise the OSSA member roster. The Alliance is designed to include everyone and offers membership levels to meet the needs of companies big or small. Benefits of joining OSSA include access to the Alliance framework and the ability to connect, discuss, influence and collaborate with other Alliance members to steer change for the betterment of the industry.
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embrace more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centred around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offer complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasised systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognise a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the bigger picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.” Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorised, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorised that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarises the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organisations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command centre space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimise these centres. Stay tuned for the full GSX 2019 show review.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
Physical security supports a future-proof cyber security strategyDownload
- IDIS video technology prepares Netherlands’ Circuit Zandvoort for 2020 Formula 1 Grand Prix
- Hikvision cameras secure logistics company Samskip with the help of Securitas Iceland
- MOBOTIX secures Bolloré Logistics, New Zealand with hemispheric and Dual D15 cameras
- Panasonic helps reduce hooliganism and increase safety at Danish Superliga football club Brøndby IF