Bosch CCTV Camera lighting(37)
Browse CCTV Camera lighting
CCTV camera lighting products updated recently
MOBOTIX Mx-A-IRA-120 PoE-powered high-caliber infrared illuminator for MOBOTIX cameras with B&W sensor
MOBOTIX Mx-A-IRA-15 PoE-powered high-caliber infrared illuminator for MOBOTIX cameras with B&W sensor
MOBOTIX Mx-A-IRA-45 PoE-powered high-caliber infrared illuminator for MOBOTIX cameras with B&W sensor
MOBOTIX Mx-A-IRA-30 PoE-powered high-caliber infrared illuminator for MOBOTIX cameras with B&W sensor
MOBOTIX Mx-A-IRA-60 PoE-powered high-caliber infrared illuminator for MOBOTIX cameras with B&W sensor
MOBOTIX Mx-A-IRA-90 PoE-powered high-caliber infrared illuminator for MOBOTIX cameras with B&W sensor
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
Remember the old adage “The whole is greater than the sum of its parts?” Nowhere is that truism more evident than when you add network video to the current generation of Internet of Things (IoT) solutions. Whether we’re talking about industrial IoT applications, “Smart – X” (city, building, parking etc.) or retail operations, integrating network video into the solution provides value far beyond simple situational awareness. Optimising sophisticated video technology When video systems first moved from analogue to digital and then became part of the IoT world, they were primarily used to provide visual validation of sensor-detected events. For instance, if an industrial controller sensed an environmental issue such as a temperature exceeding set threshold maximum limits, the sensor would trigger the management software to notify the operator that this event had occurred. The operator could then pull up the video feed of the closest camera and observe the area remotely. While this application is simple, it shows how video enhances sensor management. As edge devices, such as sensors and network video become more intelligent, the interactions between systems are growing in sophistication and generating even greater value than each system could provide on its own. To appreciate how these smart applications are being used to improve overall efficiencies and profitability, let’s delve into three areas where they’re being deployed: intelligent buildings, smart cities, and smart retailing. By overlaying intelligent operational sensors with intelligent video, it’s now possible to automate lighting levels based on motion detection Video-based operational analytics Applying intelligent monitoring to environmental equipment (HVAC) makes it easy for building owners and property managers to determine existing operating costs based on current equipment performance. They can then compare that amount to the cost of upgrades and potential cost savings over time. Lighting is another significant operating cost within building management. By overlaying intelligent operational sensors with intelligent video (light sensors), it’s now possible to automate lighting levels based on motion detection. Lights can automatically turn on or off, brighten or dimmed, to eliminate wasteful energy consumption. With the addition of occupancy analytics via intelligent video, property managers can determine what caused the motion and learn other operational details such as occupancy counts. Did someone walk through and area causing lighting to turn on or up? Did they dwell in this area? These specifics can help managers efficiently optimise lighting controls and reduce the overall operating cost of the property. Businesses are also using smart applications to optimise allocation of desk space and conference areas. For instance, intelligent video can determine conference room occupancy (in use, number of people in room, free space even though showing booked) far better than stand-alone motion sensors. When tied to automated room assignment systems, the additional statistics provided by video analytics might suggest room changes based on room size and number of attendees through back-office applications such as Microsoft Outlook. These examples are just a few of a growing list of available video-based operational analytics currently on the market. Video analytics in smart cities Initial forays into smart city technologies such as smart lighting, smart grid, smart parking and so on relied on standalone sensor technologies. Their capabilities were good but limited. Smart Lighting for instance would use basic light detectors to turn street lighting. Smart Parking and traffic systems would use weight sensors to trigger vehicle counts, traffic signal changes or determine if a parking space was in use and paid for. Augmenting these applications with intelligent video and analytics, however, opens up a whole new world of additional details. In Smart Lighting, the video sensor can now trigger a change in lighting based on rules such as vehicular and pedestrian events. Video analytics can yield additional metadata such as vehicle type (commercial versus public use). Smart Parking becomes much more effective when you can begin to provide vehicle detail such as vehicle type or other information based on licence plate recognition. These additional details can help parking lots operate more efficiently and offer value-added services like space reservation and open space location notifications. Augmenting smart city applications with intelligent video and analytics opens up a whole new world of additional details Smart Grid offers some less obvious but equally valuable system augmentation capabilities. We often associate Smart Grid with simple automated meter reading but these systems also traverse critical power infrastructure. Solution providers in this arena are now offering heightened asset and perimeter protection via integration of network-based radar detection with video and audio analytics. This strategic mix of technologies can be used to minimise false detection alarms, turn on/off or change lighting levels and point cameras to areas of interest for extremely effective and cost-effective perimeter security. Network video for retail intelligence Retailing was one of the earliest adopters of smart device integration with network video and video analytics to support loss prevention and customer safety. They’ve been using video to analyse customer traffic and behaviour in order to improve product placement, increase product sales, as well as cross-sell related items. Adding programmable “Digital Signage” to the mix created new opportunities to display targeted messages based on viewer demographics about additional products and services of potential interest. Integrating network video with point-of-sale terminals to reconcile cash register receipts, adding heat mapping analytics to study customer foot traffic patterns, measuring check out wait times to increase employee productivity and efficiency as well as improve the customer experience are just some of the ways retailers have applied the principles of IoT to their advantage. Overlay intelligent building controls and you can see the exponential power of integrating intelligent video with other IoT devices and systems. Retailing was one of the earliest adopters of smart device integration with network video and video analytics to support loss prevention and customer safety Minimising metadata overload Smart application integration produces an enormous amount of metadata. Collecting, transporting and synthesising this data into meaningful business intelligence can be daunting. It requires disciplined use of resources from the network infrastructure transporting the data locally to the various cloud technologies (private cloud, hybrid cloud, public cloud) storing and disseminating it securely. Generally smart sensor data is fairly light weight in terms of actual data transmitted. Adding video elements can significantly increase bit-rate (bandwidth and storage) requirements. This highlights the need for the video to be more intelligent and interactive with the intelligent sensor and edge device technologies so that resources can be used more efficiently. Smart applications let you do that. You can fine tune video rules and optimise transmission based on retention value. You can program the video to sensor triggers or events, transmitting lower frame rate and resolution video for less interesting video and increasing the video settings when higher quality video is more relevant and valuable based on these sensor triggers. The back-end collectors of sensor metadata are becoming more mainstream and easier to operate. In many sectors, service providers are offering management of this sensor output “As a Service.” As smart IoT technology continues to mature, the benefits of integration between network video systems and other network solutions will only get better. We’re already seeing greater efficiency in operations as well as higher quantifiable returns on investment through cost savings and more in-depth, usable business intelligence.
Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a modern First World society, where we have come to depend on timely and efficient power at our fingertips. In reality, that reliable electricity that we all enjoy has many people working around the clock to ensure its reliability, resiliency and security. Today’s grid operators are inundated with natural and man-made threats. As utilities tackle the monster of the moment, which is the evolving cybersecurity threat, we must not take our eyes off the more primitive threat. Security threats to US grid Electricity is perhaps the most vital of the critical infrastructures and key resources that support our society. The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long?term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Currently, the most significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists During emergencies, NERC supports industry actions to respond, mitigate and restore the BPS to normal operation by facilitating effective information sharing and communication with and between NERC registered entities, government agencies and the media. This information is not focused on operational decision making; but instead provides utilities data, best practices and mitigation strategies to help recover from crisis. Obviously as a regulatory body, NERC must stay out of emergency response until the utility has best mitigated the threat or reliability issue. Currently, the most significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks specifically targeting the grid are rare, but an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target”, could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. An attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target”, could inflict significant damage Critical infrastructure protection Critical infrastructure protection is a cyclical process incorporating prevention, detection, mitigation, response and recovery. The key to this protection is the identification of credible threats, which will assist energy companies in assessing risks and potential vulnerabilities (weaknesses) of their facilities. Once a threat has been thoroughly analysed, it is then possible to institute preventative measures to deter, detect and delay an attack. Of course, critical infrastructure protection planning must always include mitigation, response and recovery actions in the event an attacker is successful. While the security of the grid is a shared responsibility between the government and the private sector, the primary responsibility rests with utility owners and operators. Utility security staff have a responsibility to ensure they are able to receive and act upon criminal intelligence and be prepared to identify risks and vulnerabilities associated with security threats. Any protection programme that is developed must be as efficient and cost-effective as possible, as budgets are limited and ratepayers are sensitive to wasteful spending. Effective security programmes rely on risk management principles and associated tools to establish priorities, allocate budget dollars and harden infrastructure sites. Physical security protection encompasses defensive mechanisms to prevent, deter and detect physical threats of various kinds. Specifically, these measures are undertaken to protect personnel, equipment and property against anticipated threats. Properly conceived and implemented security policies, programmes and technologies are essential to ensure a facility’s resistance to threats while meeting demand, reliability and performance objectives. Unfortunately, many do not realise the amount of reports, guidelines, standards and assessments that have been developed for use Electricity industry physical security standards Significant progress has been made in the electricity industry surrounding the issue of security. Unfortunately, many do not realise the amount of reports, guidelines, standards and assessments that have been developed for use. The industry has gone through multiple iterations of mandatory Critical Infrastructure Protection (CIP) Standards that focus on security protections. The CIP Standards, while not perfect, may be an example for other sectors to immolate. These standards are a minimum baseline for compliance and utilities should not assume that because they have a good compliance programme they are somehow immune from attack. In addition, many electric utilities undergo a sector-wide Grid Security Exercise (GridEx) every two years to hone their skills and provide updates to their security practices and policies. This is in addition to annual exercises mandated by the cyber standards. It is fair to say that the industry has been very responsive to the evolving security threat and the mandatory requirements found within CIP compliance. As a result of the 2013 California substation attack that destroyed $15 million dollars in infrastructure, industry now has a physical security standard. This standard was created to protect the most critical transmission substations and control centres in North America. While protections vary, many utilities have upgraded their security measures to include concrete or non-scalable perimeters, robust access control, cameras, lighting and armed guards. It is highly likely that we will one day see similar standards put in place to better protect non-nuclear generation facilities, but only time will tell. Many utilities have upgraded security measures to include concrete perimeters, robust access control, cameras, lighting and armed guards The piece that the industry continues to struggle with is information sharing and the ability to quickly obtain actionable threat intelligence; an issue which has been combatted head-on through the sharing of security information amongst utility partners. Large utilities with the manpower and resources to address this initiative are changing the security model from reactive to proactive. If you understand your adversary’s tactics, intent, and capabilities, you can develop strategies to combat their attacks and better plan for future threats. Better, more proactive security, can be achieved through information sharing agreements and partnerships with other utilities, regulatory agencies and intelligence partners. Many utilities do not have the dedicated resources to dissect and aggregate this data and are thus unable to react appropriately, or wind up drawing inaccurate conclusions. As a result, the electricity sector is demanding more access to actionable intelligence and threat streams. With this added intelligence, utilities can better pinpoint threats to specific systems and focus efforts on system recovery and restoration. This will undoubtedly drive better, more informed responses to security incidents. The FBI, DHS and the DOE have made considerable strides in improving information sharing, and giving classified access to intelligence products Improving information sharing Over the past few years, the FBI, DHS and the DOE have made considerable strides in improving information sharing and giving classified access to intelligence products such as bulletins, alerts and secret level briefings. These products have been used to mitigate threats, reduce risk and update internal security policies. Additionally, this data flow has enhanced communications between security teams, management and board members by providing authoritative threat warnings. This ultimately drives better investment strategies by more directly connecting security priorities with business risk management priorities. Unfortunately, utilities still see risks in sharing information with federal partners. Recently, the Washington Post released an article with a salacious headline falsely suggesting that the grid was hacked via Russian malware. Even after correcting the story, the question remains: who leaked the information to the Washington Post? Utilities all over the country were witnessing an information sharing failure. We must assume that at some point in the future a North American utility will suffer from a planned and coordinated attack against electrical infrastructure. Have we looked at credible threats closely enough and did we prepare our people to respond, recover and communicate? As an industry, we will be judged and hard questions will be asked about how seriously we considered the threats and what we did to mitigate future attacks. Success will be determined by how quickly we are able to respond and the swiftness of system recovery. There is no doubt that security is an “all hands” approach by everyone involved.
The Open Security & Safety Alliance (OSSA), an industry body comprised of leaders, influencers and innovative organisations from all facets within the security, safety and building automation space, celebrates its one-year anniversary. Within its first 12 months, OSSA attracted 30+ members ranging from device manufacturers, software developers and system integrators to distributors and system on a chip (SoC) companies – helping lay the groundwork for improved security, safety, building automation and business intelligence solutions. Open security and safety ecosystem We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem" “Through OSSA, we have competing and complementary institutions reaching across aisles and stepping outside of their brands to work together to push our whole industry into a new, more prosperous and efficient direction,” said Johan Jubbega, President, Open Security & Safety Alliance. “We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem comprised of 30+ renown companies, and having a market-changing digital marketplace and first commercially available video security camera offerings underway for year two as the Alliance continues to provide guidance and interpretation of common standards and specifications to promote more intelligent, productive solutions for users.” Operation and maintenance of products Currently, security and safety solutions are fragmented and there is no collaborative approach to systems working together for bigger-picture success. Large amounts of data are left untapped in siloed systems that through cooperation can instead be utilised for better living, safety and security purposes. OSSA’s mission is to work with market players to all start from the same ‘recipe’ when it comes to the development, deployment, operation and maintenance of products, software and services. The Alliance’s vision is that the majority of the security and safety industry works with a common, vendor-agnostic operating system (OS) and IoT infrastructure – and agrees to implement or adhere to common approaches defined for common challenges like data security, privacy, product performance and easy consumption of data across multiple solutions. Collaborative digital marketplace They also started to define the common approaches and establishment of a shared IoT infrastructure This will substantially fuel usability and trust when it comes to security and safety solutions that are built on the foundations set forth by OSSA. From there, companies can differentiate through apps by way of a collaborative digital marketplace – similar to how we all access/download/use applications between an app store and our smart phones and other digital devices. Already within its first year, OSSA member companies created the first common Technology Stack specification including the definition of a common operating system for video security devices. They also started to define the common approaches and establishment of a shared IoT infrastructure, including a digital marketplace. This framework allows the trapped – and mostly unused – data captured by any brand of device to be unleashed and available for good purpose. It also reduces friction when conceiving, deploying and maintaining security and safety devices, systems and settings and inspires innovation by opening the doors to data interpretation and possibilities. This platform revolution that OSSA envisions will benefit everyone involved. Significant outputs from Alliance workgroups Significant outputs from Alliance workgroups over the past 12 months include: Documentation of a common Technology Stack including the definition of a common vendor-agnostic OS. First description of a common market approach to data security and privacy. OSSA member Security and Safety Things GmbH (SAST) realised a first version of its OS as set forth in the common Technology Stack defined by OSSA – enabling the creation of prototype cameras. Together with SAST’s first open app store for security cameras, various innovative applications were showcased this year from ISC West 2019, IFSEC 2019 and GSX 2019. The commercial launch of the platform is planned for Q1 2020. OSSA members fulfilled their first prototype cameras based on the commonly defined Technology Stack and OS, and showcased them throughout 2019 at ISC West, IFSEC and last week from GSX. Change for the betterment of the industry The Open Security & Safety Alliance’s five founding companies – Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ and VIVOTEK Inc – are joined by 25+ other inventive international players that currently comprise the OSSA member roster. The Alliance is designed to include everyone and offers membership levels to meet the needs of companies big or small. Benefits of joining OSSA include access to the Alliance framework and the ability to connect, discuss, influence and collaborate with other Alliance members to steer change for the betterment of the industry.
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embrace more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centred around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offer complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasised systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognise a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the bigger picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.” Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorised, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorised that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarises the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organisations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command centre space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimise these centres. Stay tuned for the full GSX 2019 show review.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
Physical security supports a future-proof cyber security strategyDownload
- Raytec Hybrid IP PoE illuminators protect residential palace in Lebanon from intruders
- VIVOTEK enhances security at Michelin-Recommended Korean restaurant, California
- IDIS HD video surveillance solutions protect Rossendale and Pendle Mountain Rescue Team’s assets
- Arecont Vision video surveillance deployed by Monterey Bay Aquarium, California