Intelligent IP video monitoring with Sony RealShot Manager V4
Intelligent IP video monitoring with Sony RealShot Manager V4

IP-based video security and surveillance offers outstanding performance, features and flexibility when compared with analogue CCTV systems.  Installation and operational costs can be dramatically reduced, so it's equally applicable to a single surveillance station with local monitoring, as a multi-camera, multi-site operation with remote monitoring. RealShot Manager V4 represents a new generation of management software; images are processed, analysed and archived in real-time, with many automated functions to reliably detect intrusions or incidents. In addition to the extensive, award-winning features of previous versions, Sony RealShot Manager V4 introduces Intelligent Object Detection (IOD) and Intelligent Motion Detection (IMD).  Up to six filters can be configured and set to trigger alarms or perform a variety of other actions, such as locking doors or turning on lights. Active intelligence means crucial events aren't missed - for example, a suspicious package being left unattended or movement outside of expected patterns.  And when an alarm is triggered, an on-screen box appears around the suspicious object or person - making it immediately obvious what has caused the alert situation.  These new features have the added bonus of minimising false alarms conventionally triggered by simple repetitive movements. When combined with the latest range of intelligent Sony surveillance cameras and storage devices, your network will offer state-of-the-art proactive performance. Features include: Smart Monitoring with Intelligent Motion and Object Detection Filters "Hot Spot" Monitoring and Dual Monitor support Customised layouts and intuitive user-friendly GUI "Tour" function Camera PTZ control Privacy masking function Audio support Intelligent video motion filter search Easy and quick searching of recorded images Playback while recording Simultaneous playback Flexible recording AVI file support User privileges Application Programming Interface (API)

Add to Compare
Sony IMZ-NS132M intelligent monitoring software for 32 cameras
Sony IMZ-NS132M intelligent monitoring software for 32 cameras

RealShot Manager Advanced Series is the latest version of Sony’s industry-leading management software - and it takes IP monitoring to a new level. A combination of real-time image processing, automated functions and intelligent video analysis helps detect security threats automatically and reliably. This removes the burden from your surveillance staff - so they no longer have to monitor camera feeds by eye, and they no longer have to search through hours of archived video to find incidents. The latest release builds on the functionality of previous RealShot Manager versions to make it the most advanced monitoring solution available today. Features include: HD-ready - allowing you to migrate to megapixel cameras at your own pace Simple to set up and operate - thanks to easy-to-use wizards and automatic camera detection Open platform - for compatibility with all major camera brands Scalable - from 1-32 camera control, to meet your changing needs Intelligent features including: Intelligent Object Detection and Intelligent Motion Detection, which can trigger alarms, locks and lights automatically Active Intelligence, which highlights suspicious activity on-screen to reduce false alarms Hot-spot monitoring Intuitive drag-and-drop interface RealShot Manager is the perfect tool for managing your current and future IP camera investments. For real quality network security in real time, there’s nothing more advanced.

Add to Compare
RealShot Manager Advance from Sony
RealShot Manager Advance from Sony

GO ADVANCEDThe demand for surveillance systems is growing, and the adoption of IP as a transport mechanism for video is ever increasing. Sony recognised this trend early on, and has been focused on developing products and solutions aligned with it.Now Sony is pleased to announce the introduction of the IMZ-NS100 Series Intelligent Monitoring Software, which can be installed on your own Microsoft ® Windows ® server to monitor and control 1, 4, 9, 16 or 32 network cameras (IMZ-NS101, IMZ-NS104, IMZ-NS109, IMZ-NS116, and IMZ-NS132, respectively).The IMZ-NS100 Series is easy to use and free from complicated operation - users find it simple to set up connected cameras and to set frame rates for recording. They can also easily monitor, search, and play back events with intuitive manipulation. A scalable security system can be set up in client/server configuration using more than one server installed with the IMZ-NS100 Series and/ or using the NSR-1000 Series Video Network Surveillance Server from Sony (which is perfectly compatible with the IMZ-NS100 Series).This system can be controlled by a common user management interface, which allows the administrator to freely set up the access level of each user. With the IMZ-NS100 Series, you can start an HD-ready video network surveillance system in the scale and configuration that's ideal for current conditions, and expand this system in the future.Sharpen your focus on security through the unrivalled image quality, design and extensive versatility of the Sony Professional security camera range. Don't miss this chance to take your video security forward with Sony Professional. Be there and be secure.

Add to Compare

CCTV software - Expert commentary

4 smart ways to use security to power the business of the future
4 smart ways to use security to power the business of the future

In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule.  This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace.  Strong and smart security ecosystem While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future.  Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimise their operations, and secure their network. 1)Protect your people  Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models.  This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly. Integrating platform Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example:  With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building. Leveraging AI and machine learning Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes. When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimise congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively.  All of this is powered by a security ecosystem that can help a business better protect its people while realising other benefits in the process. 2) Safeguard your assets Businesses are concerned about the security of their assets when it comes to the hybrid workforce model Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach.  This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations.  As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely.  Remote management and visibility This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic. These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more.  Loss prevention strategy When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more. For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits. 3) Optimise your operations The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimise their operations – especially now with the challenges posed by price inflation. A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more.  Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs Cloud video surveillance systems For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition. However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilised, and an additional 20% aren’t even aware that it could be used in other ways. AI and analytics The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimise their operations, helping their business to operate more effectively and efficiently.  The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience. 4) Secure your network Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats.  Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behaviour.   Cybersecurity software For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behaviour, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach.  A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defences so that they can avoid downtime and continue to operate with peace of mind.  Prepare your business for the future Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem.  With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimising operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence. 

How are new management systems innovating the hospitality industry?
How are new management systems innovating the hospitality industry?

Technology has certainly become an intrinsic part of our day-to-day lives, from the retail industry, to food and beverage outlets, and even within the health and fitness industry. It’s all around us, in varying formats, making processes more efficient. It has refined some of our older approaches, and in the hospitality industry, this is certainly true. Technological advances are leading the way forward for the future of hotels, and with the sector now free from COVID-19 restrictions, venues are looking for ways to improve the guest experience with technology. A staggering recent statistic has suggested that 75 percent of activities in hospitality could one day become automated — so where exactly are we heading on this journey into the future of hotels? Join Cairn Collection, owner of The Stirling Highland, and explore a whole host of innovations that are changing the face of hotel management systems. The 21st-century check-in desk The breadth of technology that is slowly becoming more widely available is transforming the hospitality industry The digital age is constantly finding new ways to innovate and prove its value and worth for modern consumers, and the breadth of technology that is slowly becoming more widely available is transforming the hospitality industry. In the past, connotations of a check-in desk were long queues and excessive pieces of paper — from room service menus to a mini catalogue of highlights of the local area. Technological innovations such as face recognition are one of the major ways that this process is changing. Using artificial intelligence A handful of hotels have already trialled or introduced artificial intelligence (AI) into their daily running, and it looks set to become far more mainstream by 2025. From paying the bill by using biometrics to allowing hotel managers to handle data more efficiently, AI looks set to be welcomed with the potential for it to reduce costs by 13 percent. The entire hotel check-in process could become automated, making one of the most established parts of the hotel experience redundant — but staff could be freed up to engage with customers, allowing them to get into their rooms quicker in the meantime. Many venues have even gone fully paperless when it comes to checking in, choosing instead to upload the process to cloud computing systems where information can be stored and viewed by connected devices. Convenience is the key More hotels operate their room unlocking facilities through mobile phone-connected technology, NFC After having checked in to a hotel, guests will want to explore the room that they’ve booked. Doing so has never been easier, and the classic magstripe locks which were once the most commonly used method of accessing hotel rooms are being progressively phased out. More and more hotels now operate their room unlocking facilities through mobile phone-connected technology, near-field communication (NFC).  This technology allows for data transfer at up to 424 kb per second, and it is enabled when connected devices come into contact with each other. Mobile key systems Most mobile key systems require guests to download and activate a key through the hotel’s digital app, and upon arrival, they can use the activated key to unlock the door to their hotel room. Combined with online/digital check-in services, guests can use the e-key to check in early or at a time that suits them best, knowing that they don’t have to wait around to pick up a physical key. Small touches like this build a sense of brand familiarity for customers, as well as streamline their hotel experience, and this distinguishes them from competitors. Hotel management systems Hotel management systems need to account for the experience that guests have while staying at the venue Of course, hotel management systems also need to account for the experience that guests have while staying at the venue and technology can do a lot to enhance this. Hotels have to innovate the spaces that they are presenting to their customers and technology has become a valuable asset to help enhance customer satisfaction, as the hotel room is certainly not simply a place for rest anymore. Voice-enabled devices Voice-enabled devices are becoming common features in rooms, with popular models such as Google Assistant, Apple’s Siri, and Amazon Echo providing guests with information on the local area — if you’re looking for the perfect backdrop to the business dinner you’re attending, just ask Alexa! Hotels could even record and distribute their personalised voice messaging to help reinforce the brand presence into the technology. Technology can help you attract and retain customers by offering services above and beyond what they’d usually receive A room and then some As the generational switch to millennials and Gen Z continues, the need for an experience has grown and, through a mixture of technology, hotels can cater to these revised consumer needs. From setting up messaging platforms to providing a remote control that monitors absolutely everything in the room — from atmospheric mood lighting to music streaming services and more, a hotel room can be whatever the user wants, and the experience is therefore generated by the customer. Technology doesn’t stop advancing, and there are constantly new, refined approaches to hotel management systems that have marked a stark departure from ways of the past. With guests returning after over a year of COVID-19 restrictions, competition for their business is even tougher. Technology can help you attract and retain customers by offering services above and beyond what they’d usually receive.

Network operator fraud remains the biggest threat to the revenues of mobile operators
Network operator fraud remains the biggest threat to the revenues of mobile operators

As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.  In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.  Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.  Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”  Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”  “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”    Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.  Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”    A simple but effective fraud  Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes.  A primary risk is SIM Box fraud.  SIM Box fraud  SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal.  The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”  While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.   Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”    Is it illegal?  If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.  For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.”  “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”  Other telecommunications fraud  Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.  While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.  The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”  “The call starts as a dialled telephone call, but the user receives it within an OTT app.  If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”  Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”  According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”.  This is defaulted to “on” when the app is downloaded.  Only the most technologically savvy users would even know it was there.  Combatting the fraud against networks  Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud?  The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”  “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible.  This has led to a mindset where whatever the questions the answer is always more marketing promotions.”  A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.  An opportunity for the future  As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.” 

Latest Sony Professional Solutions Europe news

FLIR Systems releases updated Blackfly S machine vision USB3 camera with Sony’s Pregius S sensor
FLIR Systems releases updated Blackfly S machine vision USB3 camera with Sony’s Pregius S sensor

FLIR Systems, Inc. announced the availability of the new FLIR Blackfly S visible spectrum camera module, the first to integrate the Sony Pregius S IMX540 sensor with 24.5 MP at 12 FPS in a USB3 camera. The combination of the Blackfly S feature set with IMX540’s high megapixel (MP) count and fast imaging enables engineers and researchers from biomedical to semiconductor industries to inspect more in less time and with fewer cameras required. Machine vision expertise OEM machine designers, and researchers rely on FLIR for high quality, full-feature machine vision cameras" “OEM machine designers, engineers and researchers rely on FLIR for high quality, full-feature machine vision cameras,” said Paul Clayton, General Manager, Components Business at FLIR Systems. “With this latest Blackfly S model, we continue the tradition of combining the best technology with world-class support to empower our customers to achieve their objectives faster and at lower costs.” With a new backside illuminated (BSI) 2.74 µm pixel, the Pregius S sensors nearly doubles the pixel density of earlier Pregius sensors while taking advantage of lower cost and more compact lenses. Delivering 24 MP, 12 FPS Sony Pregius distortion-free imaging of fast-moving targets, the Blackfly S enables faster production lines even for very detailed inspection. High quantum efficiency The Blackfly S also delivers high quantum efficiency and low read noise allowing shorter exposure times, and therefore less powerful lights are required resulting in lower lighting costs. The FLIR Blackfly S BFS-U3-244S8M/C-C is available for purchase globally through FLIR and authorised FLIR distributors. FLIR will also release additional Pregius S sensors on GigE and 10GigE interfaces later this year. To learn more about the Sony Pregius S, visit the company’s official website.

Matrix launches 5MP IP cameras with higher resolution for better surveillance
Matrix launches 5MP IP cameras with higher resolution for better surveillance

With the continued demand for IP Video Surveillance in Small and Medium-scale Enterprises, new solutions that produce better image quality in the most challenging conditions are needed. To meet the growing needs of SMBs, Matrix has strengthened its offerings by adding 5MP IP Cameras to its existing range of 2MP and 3MP IP Cameras. Equipped with Sony STARVIS sensor with Exmor technology the 5MP IP Camera delivers a true, 104-degree Horizontal field-of-view (FOV) and exceptional low light performance in light as low as 0.01 lux. With its H.265 compression, users can reduce storage consumption by up to 30%. Available in Dome and Bullet variants, Matrix 5MP IP Cameras are ideal for both indoor and outdoor applications. Exceptional quality low light images Key Features: Better Quality Images with 5 MP Resolution Sony Starvis series Sensor with Exmor Technology for Exceptional Low Light Performance Larger Field-of-View (FOV) – 104 degrees HFOV Colour Images in Light as Low as 0.01 lux IP67 and IK10 Protection Latest H.265 Compression Technology True WDR – to Deliver Consistent Images in Varying Light Conditions “Higher resolution and detailed images enable 24*7 effective surveillance. Matrix’s existing range delivers exceptional quality low light images, and the new 5MP resolution takes it to a completely new level. Owing to the high resolution, these IP cameras provide sharper and brighter images with even more details.” said Vihar Soni, Marketing Manager, Matrix Comsec.

ONVIF reflects on 2019 activities and plans for new profile development in annual meeting
ONVIF reflects on 2019 activities and plans for new profile development in annual meeting

ONVIF, a global standardisation initiative for IP-based physical security products, held its annual membership meeting in November, providing ONVIF members with an overview of important activities of 2019 and plans for the year ahead. Attendees heard presentations on the growth of ONVIF, as well as plans for new profile development. ONVIF Chairman Per Björkdahl highlighted the forum’s achievements over the past year, particularly the market’s continued support for the profile concept, with the number of conformant products surpassing 13,000 earlier this year. With six profiles to choose from and additional ones in development, ONVIF profiles have increasingly been included in various bid and specification processes in projects around the world, making it the de-facto interface in the industry. Björkdahl also noted the continued involvement of ONVIF in the International Electrotechnical Commission’s work on international standardisation, in addition to new proposals for cloud connectivity and interoperability between multiple systems. Video Enhancement Working Group The overarching goal of ONVIF is to provide to the market a single interface through which every system can operate As is tradition, ONVIF recognised the contributions of multiple individuals from various ONVIF committees. Steve Wolf, who served on several ONVIF committees on behalf of Pelco, received the ONVIF Service Award, which acknowledges individuals who have provided a long-term commitment to the organisation. While serving on the Technical Committee, Wolf led the Security Working Group, and was also an active participant in the Video Enhancement Working Group, contributing to a number of improvements in how ONVIF approaches video. Andreas Schneider of Sony received the ONVIF Distinguished Service Award, which recognises individuals who have made significant contributions to ONVIF over many years in multiple functions. Schneider’s long-term service to the Technical Services Committee has positioned him as a major facilitator of the ONVIF organisation, with contributions to multiple ONVIF profiles. Physical access control standards “The overarching goal of ONVIF is to provide to the market a single interface through which every system can operate,” said Björkdahl. “Our honorees have shown significant and long-term commitment to our organisation, in turn making this goal a reality one profile at a time. We thank both of our recipients for their innovation, hard work and service.” ONVIF Technical Committee Chairman, Hans Busch of Bosch, spoke to members about the specification development roadmap, which highlights plans for future profile development, as well as the continued alignment to the standardisation activities within the IEC TC 79 working groups for video surveillance and physical access control standards. Specifically, Busch covered what specifications are being examined for future profiles, and how they complement and further enhance existing ONVIF profiles. IP-based physical security products ONVIF continues to work with its members to expand the number of IP interoperability solutionsAs chair of the Technical Services Committee, Sony’s Schneider gave an overview of the committee’s work on new and existing profiles, client and device test tools, updates to the conformance process and tools, and the Developers’ Plugfest. Shi-lin Chan of Axis Communications, who serves as chair of the ONVIF Communication Committee, provided a recap of ONVIF communication efforts in 2019, and discussed ONVIF’s plans for the launch of a Mandarin website later this year. Founded in 2008, ONVIF is a well-recognised industry forum driving interoperability for IP-based physical security products. The organisation has a global member base of established camera, video management system and access control companies and more than 13,000 profile conformant products. IP interoperability solutions ONVIF offers Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality, Profile A for broader access control configuration and Profile T for advanced streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.

Related white papers

The rise of ethical facial recognition

Connected video technology for safe cities

Video Surveillance as a service: Why are video management systems migrating to the Cloud?