Omnicast 4.7, the latest version of Genetec’s IP video surveillance system
Omnicast 4.7, the latest version of Genetec’s IP video surveillance system

Omnicast 4.7 – IP Video Surveillance System Omnicast is the IP video surveillance system of the Security Center, Genetec’s unified security platform. It is the perfect solution for organizations requiring seamless management of digital video, audio and data across any IP network. The release of the latest version Omnicast 4.7 provides an array of new features and enhancements to the system. New Features & Enhancements  Video Trickling: Video trickling leverages the recording capabilities of the edge devices (IP cameras and encoders) by providing the ability to choose and transfer the video from the edge on demand and store it in Omnicast for long-term archiving. This new feature allows for increased recording reliability, bandwidth usage optimization by only transferring video of interest at the right time, and the opportunity to lower costs of remote-site recording by going serverless. HTTPS support: HTTPS support increases security of the edge device communications by encrypting the commands and controls of the cameras. The support for HTTPS is available with all Axis cameras and encoders, fifth generation Sony cameras, and the Genetec extension when supported by the partner. Simplified unit enrolment process: It is now possible to search and enroll cameras by manufacturer name and add units to the system based on a specific IP address range so that multiple units can be added simultaneously, saving considerable time during setup. Support for Axis cameras’ Cross Line Detection feature: Customers can now monitor and handle cross line alarms within Omnicast, and search for cross line alarms directly from the Archive Player. Additional languages: In order to enhance the user experience, Arabic, Persian, Thai and Russian languages have been added to Omnicast 4.7. The user interface has also been adjusted to read from right to left in both Arabic and Persian.

Add to Compare
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012

At the ASIS trade show and conference, Genetec, a pioneer in the physical security industry and a leading provider of world-class unified IP security solutions, showcased the latest advances in its unified security platform, Security Center, which blends license plate recognition (LPR), video surveillance and access control into one easy-to-use platform. Show attendees had the opportunity to climb aboard Genetec's AutoVu Demonstration Vehicle to experience the state-of-the-art in mobile license plate recognition technology, while driving around the streets of Philadelphia.  The newest version of Security Center introduces a host of new features designed to further enhance security events and video monitoring, simplify the system's operation, streamline upgrades and maintenance activities, and help users easily monitor the health of their entire security platform. Also featured in Security Center is Plan Manager, an advanced map-based interface that allows users to create a virtual environment from maps, floor plans, or GIS (geographic information system) maps for all types of sites including cities, neighbourhoods, airports, campuses, industrial sites, and buildings. With Plan Manager, each video surveillance entity (cameras, sensors, doors, alarms, etc.) is represented on the map by an icon. Operators can simply click on these icons to trigger actions such as 'show a camera', 'lock a door', 'execute a macro', 'turn off an alarm', etc. Security Center also features the latest in mobile applications allowing organisations to equip their security personnel with an Apple® iPod touch®, iPhone®, iPad®, RIM BlackBerry® or Android™ Smartphones so that they can monitor and control their security operations over any wireless network, while on the move. At this year’s ASIS, Genetec will demonstrate video playback on smartphones, as well as streaming video from smartphones back to the Security Center for live viewing and recording. Security Center Mobile also features the industry's first platform-independent, universal web client for video, access control, and license plate recognition. The unified web client allows customers to connect back to their platform to view live video streams, control PTZ cameras, configure aspects of their access control and LPR systems, and run reports from most web browsers including Microsoft Internet Explorer®, Mozilla Firefox®, Google Chrome®, and Apple Safari®. Show attendees who were interested in experiencing the latest advances in mobile License Plate Recognition technology were able to sign up to drive around the streets of Philadelphia in the Genetec Demonstration Vehicle, a fully equipped Dodge Charger featuring AutoVu, Genetec's innovative LPR system. AutoVu automatically collects vehicle license plates and alerts the user of issues or infractions and offers a perfect solution for wanted vehicle identification, mobile license plate inventory, or for permit and/or time-limit parking enforcement. Inside the car, on a ruggedized laptop installed for driver use,  was the AutoVu Patroller, a highly mobile, easy to use software designed to automate the verification of vehicle license plates. On the car's body there were several AutoVu SharpX IP-based LPR cameras. Specifically designed for mobile applications, the SharpX IP on-vehicle camera is one of the smallest high-resolution LPR cameras in the world. It provides images with two to three times higher resolution than most other LPR cameras on the market and results in extremely accurate license plate read rates – even in bad weather, at poor angles, and at high speeds.  The trunk of the car housed the AutoVu LPR Processing Unit and Security Center which provided the back-office management capabilities of the system so that in-vehicle users are able to download all the latest hotlists and updates. The in-vehicle patroller application allows users to review all data collected throughout the day while the Security Center operator can monitor reads from all vehicles in the back-end. Wirelessly, or at the end of a shift, all data collected can be synchronized with the organization's central Security Center system for ongoing analysis.

Add to Compare
Genetec Unveils Stratocast: A New Affordable and Easy-to-Use Cloud-Based Video Surveillance Solution on Windows Azure
Genetec Unveils Stratocast: A New Affordable and Easy-to-Use Cloud-Based Video Surveillance Solution on Windows Azure

Genetec, a pioneer in the physical security industry and a leading provider of world-class unified IP security solutions,announced Stratocast, a powerful yet easy-to-use Video Surveillance as a Service (VSaaS) solution powered by Microsoft Corp.'s Windows Azure cloud-computing platform. Stratocast is designed to meet the needs of small and midsized businesses who are looking for a high-end and extremely reliable video security solution without the costs and complexities typically associated with installing and managing on-premise surveillance systems. Currently undergoing extensive beta testing at customer sites around the world, Stratocast is scheduled to ship in the spring of 2013.  Because the new product will be sold and supported exclusively by Genetec's Stratocast channel partners, end users will benefit from Genetec's certified integrators' installation expertise, security know-how, and ability to recommend the most appropriate product package for their needs. With minimum training and setup costs, minimal onsite equipment to maintain and manage, and no need for specialised/dedicated security or IT staff, users will be able to focus on their core competencies, while benefiting from a state-of-the-art security system to protect their employees, premises and assets. "With Stratocast, we are bringing 15 years of expertise in developing safety-critical video surveillance systems for users that include the world's most traveled airports, largest retailers, and Fortune 500 businesses, to a section of the market that is currently underserved by existing systems. Because Stratocast is affordable, easy to install and simple to use, quick service restaurants, retail shops, office buildings, as well as sporting and musical events, will finally have the professional tools they need to secure their facilities, remotely observe their operations, and ensure a safe environment for their employees and patrons, at a price they can afford," says Pierre Racz, Genetec's Founder and CEO. With packages starting below $10 USD a month per camera, Stratocast users will have access to some of the most advanced functionalities that have made Genetec a leading Video Management Software (VMS) vendor, including: HD video capture for unbeatable picture quality; next-generation intelligent video management features that automatically alert users when an activity or incident has occurred instead of having to review hours of recorded video; and the unique Cloud Federation feature, which allows enterprise users to easily add new cameras to remote/satellite locations and supplement their existing on-premise Security Center unified security management platforms .Other features such as robust edge recording and video trickling capabilities, mean that cameras, bandwidth, and archives can be fine-tuned to each user's needs and requirements. With a guaranteed uninterrupted service 99.5% of the time, and a fresh, modern and easy-to-use interface, users will be able to quickly and reliably access live and recorded feeds from their Stratocast system from any computer, smartphone or tablet - from anywhere in the world - to ensure peace of mind while they are away. "Windows Azure gives customers a secure and flexible cloud platform that opens up new possibilities for delivering solutions such as high-end security services to businesses of all sizes. With Windows Azure and Stratocast, customers can automatically and safely store security assets, including video and related critical data, in the cloud so they can easily reuse, retrieve and analyse their data at anytime, anywhere," comments Mike Howard, Chief Security Officer at Microsoft. Stratocast will support a wide variety of cameras that feature "phone home" functionality, including both fixed and PTZ (pan tilt and zoom) cameras.  And with over 40 models of Axis cameras available at launch, Stratocast allows customers to choose the most appropriate camera for the unique needs of their security installation. "Most small and midsized businesses today still rely on analog cameras, and DVRs, for their security needs, but this is changing fast. With Genetec developing hosted cloud-based video and Axis delivering intelligent cameras designed to leverage the simplicity and ease of use of the Stratocast system, together we are driving the technology shift from on-premise to cloud-based video surveillance in small installations," says Dominic Bruning, Director Global Alliances at Axis Communications. "Building upon our long standing relationship, we are thrilled to be the camera partner of choice for the launch of Stratocast."

Add to Compare
Security Center 5.0 – Genetec’s unified security platform
Security Center 5.0 – Genetec’s unified security platform

The Security Center is a unified security platform that seamlessly blends Genetec's IP license plate recognition, video surveillance and access control systems, AutoVu, Omnicast and Synergis, within a single innovative solution. Consolidate real-time monitoring, alarm management, reporting, and playback of events across all your security systems, from one interface.Here are some of the latest features of version 5.0:• Unified configuration: A single client application can now be used to efficiently configure your video, LPR, and access control systems, streamlining the whole configuration process for system administrators. • Next-generation video engine: Security Center 5.0 video performance enhancements include rendering of more cameras per workstation, an enhanced streaming engine that optimizes routes video and audio will take throughout your network, and better video fluidity over wide area networks (WANs). • Local video caching and buffering, all-frame video playback: This new function of Security Center 5.0 buffers video locally on the client workstation, reducing the amount of retransmission that is typically required for video thereby minimising bandwidth usage, as well as providing users faster access to recorded video. • Intrusion integration: Security Center 5.0 now supports the integration with third-party intrusion panels and perimeter detection systems. Users can now run reports on intrusion panel events, view video tied to intrusion events, and arm/disarm intrusion devices either through automated scheduled tasks or manually via the user interface. • Enhanced integration toolkits: The Security Center Software Development Kit (SDK) has been augmented with embedded video functionality, now providing developers with a single SDK for access control, video, and LPR. Additionally, Genetec has added a number of new toolkits to its existing portfolio, namely a web service SDK for development geared towards additional operating environments and an intrusion driver development kit (DDK) to facilitate the integration of third-party intrusion panels.Interested in obtaining more information on our products and solutions, check out our website at genetec.com or visit us at ASIS, booth 846. 

Add to Compare
Security Center: Unified security platform
Security Center: Unified security platform

The Security Center is a unified security platform that seamlessly blends Genetec’s IP video surveillance, access control and license plate recognition systems within a single innovative solution.Some Benefits of the Security Center:Unify your operationsOffers customers a truly unified approach to managing their security and public safety operations. True unification means that every aspect of your security operations is consolidated under a single platform, from real-time monitoring to alarm management, reporting, and playback of events. Though flexible enough to run as either an access-only, LPR-only or video-only interface, the Security Center truly comes to life in multi-application environments.Simplify your workflowsThe basic operating principle behind the Security Desk is to simplify the operator’s job. Through innovative concepts such as operator-initiated tasks, a dynamically adaptive interface, and context-sensitive widgets, operators are given the right functionality to perform their duties at the right time, while removing unnecessary items that typically clutter an interface.Empower your operatorsOperators can intuitively generate reports, monitor remote and local cameras, and track cardholders and assets with the single click of a mouse button on a workstation, from a touch screen, or even a mobile device. Given that the interface is adapted to only the tasks that are pertinent to each operator, users quickly become familiar with the system’s functionalities through self-learning, thus allowing for increased autonomy and confidence within your team. Download the Genetec Security Center brochure

Add to Compare

CCTV software - Expert commentary

Network operator fraud remains the biggest threat to the revenues of mobile operators
Network operator fraud remains the biggest threat to the revenues of mobile operators

As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.  In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.  Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.  Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”  Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”  “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”    Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.  Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”    A simple but effective fraud  Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes.  A primary risk is SIM Box fraud.  SIM Box fraud  SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal.  The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”  While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.   Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”    Is it illegal?  If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.  For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.”  “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”  Other telecommunications fraud  Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.  While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.  The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”  “The call starts as a dialled telephone call, but the user receives it within an OTT app.  If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”  Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”  According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”.  This is defaulted to “on” when the app is downloaded.  Only the most technologically savvy users would even know it was there.  Combatting the fraud against networks  Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud?  The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”  “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible.  This has led to a mindset where whatever the questions the answer is always more marketing promotions.”  A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.  An opportunity for the future  As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.” 

The automated future of retail and how to secure it
The automated future of retail and how to secure it

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

How AI and security guards work together using video analytics
How AI and security guards work together using video analytics

How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilise. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.

Latest Genetec, Inc. news

Genetec announces their new Security Center Airport Badging Solution (ABS)
Genetec announces their new Security Center Airport Badging Solution (ABS)

To comply with regulations for the credentialing of airport and airline employees and contractors, airports have to undertake complex and time-consuming processes to issue and administer badges or face hefty fines. To help airports of all sizes automate and simplify this process, Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions, announces its new Genetec™ Security Center Airport Badging Solution (ABS). Multiple different systems The Security Center Airport Badging Solution provides an industry-first: a simple, out-of-the-box solution for airports that ensures compliance, simplifies the badging process, and lowers the overhead needed to run a badging department. ABS reduces the need to work with multiple different systems and reduces incompatibility issues. This not only minimises the risk of potential human error that comes with disparate systems and manual processing, but also saves time and increases efficiency. Multiple disconnected systems ABS streamlines and automates background checks within an airport’s unified physical security platform “To manage their badging process and employee background checks, some airports have until now had to resort to a variety of single-purpose systems, while others have opted for complex Identity Management System (IDMS) that tend to be better suited for larger airports,” explained David Lenot, Critical Infrastructure Practice Lead at Genetec Inc. “While both options allow airports to remain compliant with regulations, these solutions present operational inefficiencies. ABS helps reduce human error that can stem from managing multiple disconnected systems and avoids the complexities of large-scale Identity Management Systems.” ABS streamlines and automates background checks within an airport’s unified physical security platform – Genetec™ Security Center. Regular identity verifications With a design based on standards set forth by each country’s regulatory bodies and specificities from security background vetting services and clearinghouses, Security Center ABS helps airports deliver the required information in the correct format to successfully submit and process each employee application, and consistently meet audit and compliance requirements set by authorities such as regular identity verifications via the Rapback process. All data collected on each badge applicant is compiled and stored within the system. Customised dashboards are included within Security Center to showcase insights such as real-time applicant statuses, and unaccounted for badge percentages so that airport administrators can make more informed decisions, especially when it comes to meeting audit and compliance regulations.

How important will body-worn cameras be moving forward?
How important will body-worn cameras be moving forward?

The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward? 

What are the security trends in energy and utilities?
What are the security trends in energy and utilities?

Many of the threats facing the energy and utility sector are related to cybersecurity, as recent incidents have confirmed. Another problem is that operating systems for utilities tend to be outdated, which presents extra challenges in a connected world. There are also physical security demands, not to mention regulatory and social issues. We asked this week’s Expert Panel Roundtable: What are the security trends in energy and utilities?

Related white papers

Video Surveillance as a service: Why are video management systems migrating to the Cloud?

The borderless control room

Smart and reliable rail and metro operations