TDSi unveils new integrated solutions at Essen
TDSi unveils new integrated solutions at Essen

Security Essen saw access control specialist TDSi unveil its new VUgarde IP video solution, as well as demonstrate a wide selection of systems from its reader, controller and software ranges. Speaking after the show, TDSi's Managing Director, John Davies, said: "We were absolutely delighted with the exhibition and particularly the great feedback we received both from our existing customers and from the new contacts we made there. With visitors from Germany, the Benelux countries, Eastern Europe, Turkey and the Middle East, we had the opportunity to fully demonstrate the versatility, functionality and integration capabilities of our access control and video solutions. This was the largest stand we had ever taken at Essen and it gave us a tremendous platform to showcase the breadth and depth of our range." At the heart of the company's stand was a preview of the new VUgarde system. Developed to deliver powerful yet straightforward surveillance, the cost-effective VUgarde range offers a suite of products for all requirements, from an entry level, stand-alone system capable of controlling up to 16 cameras, to VUgarde PRO, capable of managing hundreds of cameras from multiple video servers. Visitors saw demonstrations of both stand-alone and integrated options, and were particularly impressed with the functionality and capability of VUgarde when integrated with EXgarde, which enables users to seamlessly integrate video and access control. EXgarde is the company's fully featured access management software solution; proven in projects throughout the world, EXgarde provides users with a wide range of integration, control and security management functionality. Fully compatible with Microsoft Windows 7 Professional and Ultimate software suites, as well as Microsoft Vista Business and Ultimate, EXgarde provides flexible expansion and integration options, with a wide range of building management systems including CCTV, intruder, fire alarm, lift control and energy management. John Davies concluded: "As one of the world's premier exhibitions, Security Essen provides a great opportunity for us to showcase our products to an international audience. With our full product development programme continuing to deliver innovative systems and solutions, we're already thinking ahead to the next event!"  See image with caption

Add to Compare
TDSi unveils VUgarde PRO edition
TDSi unveils VUgarde PRO edition

VUgarde PRO is TDSi's range of powerful IP video surveillance solutions, providing full management control of live and recorded surveillance feeds and alarm systems. VUgarde can operate in stand-alone mode, or as part of a fully integrated system and provides a number of options to suit all project and application requirements.The VUgarde PRO client interface is extremely user friendly to operate and easy to install and configure. It uses drag and drop functionality throughout and display multiple live and recorded video stream. It has been designed to complement TDSi's other long established access management products to help provide strong integrated access control.VUgarde PRO delivers many user benefits from fast detection of potential threats or emergencies, which can enable operators to clear areas and start a security procedure in a short space of time, to various levels of security personnel with intuitive and reliable control, enabling operators to ensure that the correct personnel can gain entry whilst being mindful of emergency exits.TDSi's VUgarde range also includes:VUgarde Site, which provides everything you need to programme your VUgarde PRO video management system through a highly visual user interface. VUgarde NVR, a Microsoft .NET framework based service which is a high-end enterprise level Networked Video Recorder application capable of handling up to 32 streams of IP video.VUgarde WALL, a surveillance solution for a central monitoring and control room applications.VUgarde PLAY, a real time streaming protocol (RTSP) which is used to video streams from the VUgarde suite of products and also compliment any RTSP stream.VUgarde TOUCH, the latest in IP video control that connects easily and manages live and recorded video simply by touching the screen. For further information on TDSi's IP Video Surveillance Solutions please visit www.tdsi.co.uk or phone 01202 724535.

Add to Compare
TDSi launches new VUgarde2 VMS surveillance solution
TDSi launches new VUgarde2 VMS surveillance solution

TDSi, a global leader in access control systems for all sizes of businesses and organisations announces the launch of its new VUgarde2 IP CCTV software suite and the associated range of security surveillance products. VUgarde2 is designed to offer a portfolio of integrated IP surveillance products that offer greater flexibility and systems evolution with regards to monitoring of security, including direct integration with TDSi’s powerful EXgarde Access Control software to be included later in the year. Individual elements in the VUgarde product range include the VUgarde2 VMS (video management system), VUgarde Full Client (a comprehensive user interface to the VMS platform), VUgarde Anywhere (which allows users to access live and recorded images on a variety of devices including smart phones, tablets and laptops) and VUgarde ANPR (an automated number plate recognition application which can be added to the VUgarde VMS). VUgarde hardware includes a full range of IP cameras, video encoders and video capture cards (to allow the retention and connection of existing analogue cameras), USB keyboards (that allow users to easily control fully functional cameras) and a wide range of client and server hardware which is available in both tower and rack formats. Managing Director of TDSi, John Davies, commented, “TDSi is dedicated to offering total flexibility and integration opportunities, so VUgarde2 has been designed to offer this whilst providing a reliable and easy-to-use interface. At the heart of the new product range is the VUgarde2 VMS Software suite which brings together the different parts of the CCTV system to offer a truly combined and fully scalable solution. VUgarde2 gives a firm basis for organisations to build the security and surveillance system that exactly fits their specific needs.” The VUgarde2 VMS excels from having a powerful yet straightforward approach to digital video management. From its modular construction through to its intuitive operator graphical user interface it simplifies the design, installation and commissioning of complete IP CCTV surveillance systems. Where legacy analogue cameras need to be retained, smart encoders and video capture cards are available to maximise the previous investment. VUgarde2 is available in two editions (Express and PRO) to suit the project requirements. Both editions have a built-in simplified user management system that provides user authentication, multi-level auditing and group based permissions to limit access to permitted personnel. With the capability to be fully integrated with TDSi’s EXgarde version 4 access control platform, VUgarde2 VMS offers a single platform solution to simplify the security management of any site. Operators can quickly select their preferred camera layout and sequences whilst being alerted both visually and audibly on an alarm incident. The inbuilt dynamic multi-layered mapping application assists the operator in quickly selecting the most relevant camera. Specific benefits of using VUgarde2 software include: A simple licensing system - Buy only what you need. A modular and flexible platform - VUgarde2 can be tailored to suit any sized project and is flexible enough to expand as desired. Multiple setup wizards - Reduce installation and commissioning time. Drag & Drop functionality - Minimal operator training required. Intuitive Graphical User Interface - Simple to use with a focus on common user needs, yet powerful enough to be flexible for the largest installations. EXgarde access control integration - Allows complete integration with TDSi’s powerful access control software. Multi-level mapping - Provides full map management and drill-down, ensuring operators can quickly select the most relevant camera. Powerful event search - Quickly identifies relevant footage from the archive. VUgarde2 Anywhere - A platform agnostic application to view live and recorded CCTV footage anywhere on any smart device. VUgarde2 ANPR - A powerful optional application to detect, recognise and register vehicle number plates. For more information on VUgarde2, TDSi and all its products please visit www.tdsi.co.uk/vugarde2 or call 01202 723 535. For further information please contact TDSi’s press office on tdsi@mccint.com. 

Add to Compare

CCTV software - Expert commentary

Network operator fraud remains the biggest threat to the revenues of mobile operators
Network operator fraud remains the biggest threat to the revenues of mobile operators

As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.  In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.  Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.  Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”  Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”  “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”    Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.  Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”    A simple but effective fraud  Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes.  A primary risk is SIM Box fraud.  SIM Box fraud  SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal.  The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”  While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.   Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”    Is it illegal?  If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.  For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.”  “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”  Other telecommunications fraud  Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.  While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.  The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”  “The call starts as a dialled telephone call, but the user receives it within an OTT app.  If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”  Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”  According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”.  This is defaulted to “on” when the app is downloaded.  Only the most technologically savvy users would even know it was there.  Combatting the fraud against networks  Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud?  The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”  “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible.  This has led to a mindset where whatever the questions the answer is always more marketing promotions.”  A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.  An opportunity for the future  As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.” 

The automated future of retail and how to secure it
The automated future of retail and how to secure it

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

How AI and security guards work together using video analytics
How AI and security guards work together using video analytics

How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilise. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.

Latest TDSi news

TDSi launches new additions to its powerful GARDiS integrated access management software, with the new Version 2.2
TDSi launches new additions to its powerful GARDiS integrated access management software, with the new Version 2.2

Integrated security systems manufacturer, TDSi is proud to announce the launch of exciting new additions to its powerful GARDiS integrated access management software, in the new Version 2.2. New features added to the GARDiS platform Version 2.2 include integration with the STid BLE (Bluetooth Low Energy) mobile device authentication portal, integration with the RS485 wireless locks from ASSA Abloy and SimonsVoss, integration with the new TDSi GARDiS VU VMS software, and a new Cause and Effect Engine. GARDiS platform Version 2.2 The latest additions add valuable features to the ever-evolving GARDiS platform The latest additions add valuable features to the ever-evolving GARDiS platform, as Tina Baker, Software Project Manager at TDSi comments, “GARDiS is designed to evolve, anticipate and cater for a rapidly changing security/safety landscape. Both integration with the STid BLE portal and support for RS485 wireless locks provide greater flexibility in deploying highly secure touch-free access control.” Tina Baker adds, “Integration with our new GARDiS VU VMS solution, which is powered by our fellow VITAPROTECH Group partner and specialist in intelligent cloud video surveillance RECAS, enables customers to benefit from this next-generation solution.” STid BLE Portal integration Integration with the STid Portal provides easy, but highly secure use of a mobile device as access control authentication. By utilising the ubiquitous mobile phone, organisations can easily share or rescind access approval. GARDiS v2.2’s integration ensures easy administration of this function (using a STid login). GARDiS v2.2 now features RS485 integration with ASSA Abloy and SimonsVoss wireless locks. This adds further resilience, by enabling them to communicate directly with the controller, even if the IP network is interrupted, in order to ensure continuous secure access control. TDSi GARDiS VU VMS software integration The latest version of the GARDiS software now features integration with TDSi’s new GARDiS VU VMS solution, which has been developed in partnership with RECAS. This ensures full and seamless integration of access control and the video surveillance network, all from a single central portal. The all-new Cause and Effect module fully automates a response to one or multiple inputs (such as an intruder panel for example), so the security operator is assured that the system will enact the required action, without the need for human intervention. Cause and Effect engine The Cause and Effect engine operates on both the main security server and the local controller To meet any eventuality or situation, the Cause and Effect engine operates on both the main security server and the local controller. This ensures that even if there is a communications loss between the two, the access control function remains fully operational. It also provides easy to create and update Cause and Effect records that are bespoke to the security needs of the organisation/facility, with detailed report generation on-hand, whenever required. GARDiS Pro v2.2 also now includes a widget that enables a visual check of an access event (be it via a card, mobile or biometric credential), delivering an image of the authorised person for verification. Unlimited additional fields and new interface To add even greater flexibility to the GARDiS system, v2.2 also provides unlimited additional fields per user record. This enables the creation of bespoke fields and additional space to log notes, as required. Additionally, v2.2 also provides a revised user interface, which centralises operations and makes rapid navigation easier. Tina Baker concludes, “All these new functions are the result of close consultation with our installation partners and customers, adding true value-add features that help to improve and refine secure access control operations, and the user experience, benefitting any organisation or business that needs them.” The new features are available to download and install now through v2.2 of the GARDiS integrated access management software.

TDSi’s GARDiS access control solution now fully integrates with Milestone’s XProtect access platform through ORBNET Systems’ new integration module
TDSi’s GARDiS access control solution now fully integrates with Milestone’s XProtect access platform through ORBNET Systems’ new integration module

Integrated security manufacturer TDSi announces the powerful access control features of its GARDiS software can be incorporated into Milestone’s XProtect Access solution through ORBNET Systems’ new Access Control module. This enables security operators to harness the benefits of combining both solutions to manage their access control needs from one portal. Benefits of XProtect access By using the Milestone MIPSDK and GARDiS RESTAPI for expert compatibility, this updated solution enables Milestone Smart Clients to receive GARDiS Events and to acknowledge alarms back to GARDiS. The ORBNET Plugin to XProtect Access enables several key benefits: Cameras can be associated with doors as they are viewed in the Smart Client - both live and playback. Access Monitor in the Milestone Smart Client shows cardholder details in real-time as door events are triggered. A pop-up feature is enabled in the Smart Client so that users are notified of access requests. Interactive icons on the Milestone Map show Release, Set Barred, Set Unlocked, and return doors to Controlled Access with acknowledging alarms. Search on events/doors and Cardholders are displayed in the Access Control Tab. Alarms can be closed in GARDiS from the Milestone Smart Client. Flexible integration Tina Baker, Software Project Manager at TDSi stated, “We are delighted to be working with ORBNET Systems to enable this new integration of our GARDiS solution with Milestone’s XProtect Access. This collaboration provides security operators with additional choices on the best way to utilise their security system resources.” Tina added, “For those already using or planning to install and use both GARDiS and XProtect Access, this is a highly flexible and powerful way to combine the considerable abilities of both systems. This module delivers the levels of integration that security operators need to continue tackling threats whilst maximising the performance of their security budget.”

TDSi welcomes new placement student to its software development team
TDSi welcomes new placement student to its software development team

Integrated security manufacturer TDSi announces the arrival of its latest student placement, Vlad Radoi. Vlad has joined the company’s Software Development Team for a twelve-month placement as part of his BSc (Hons) in Software Engineering studies at Bournemouth University. Supporting placement students Vlad is the latest in an ongoing line of TDSi placement students, as Managing Director John Davies elaborated, “As a business, we have a long heritage of supporting apprenticeships and placement students across all parts of our business, so we are always delighted to support a new student.” “Software Development is a key role within the access control and integrated security industry and one which is at the heart of what TDSi does, so Vlad is exactly the type of passionate young trainee professional we look to attract and support, as they enter the world of business as well as the technology of security.” About Vlad Radoi Vlad is looking forward to working directly with the TDSi team Originally from Romania (although he has lived in the UK for over 10 years) and a fan of the McLaren Formula One racing team and Arsenal Football Club, Vlad is looking forward to working directly with the TDSi team, as he stated, “Being at Bournemouth University has been fun and weird at the same time, for the last year and a half my experience has largely been online via Zoom and Teams, due to pandemic restrictions.” “However, I am excited to be getting first-hand experience in a commercial setting with TDSi, there is much to learn, and it will kickstart my career as a software engineer.” Gaining new experience Having started with TDSi at the beginning of August, Vlad is already working closely with the Software Development Team, helping it to enhance its GARDiS Access Control software for example. “At the moment, I am working with the GARDiS API, and whilst it is complex, I enjoy studying the intricacies of it. This role gives me lots of experience working with new frameworks and language, as well as learning how software development works in the real world.” Vlad is looking forward to the year ahead and added, “TDSi is an important player in the security and access control industry, and I look forward to learning a lot more about the company, its software, and software development as a whole.”

Related white papers

Video Surveillance as a service: Why are video management systems migrating to the Cloud?

The borderless control room

Smart and reliable rail and metro operations