Webgate CCTV Software (1)
The Cam Manager can control up to 100 i-Rec or WebEye products (or Max. 400 channels). Up to 16 channels, from different locations, can be viewed simultaneously! In addition, the Cam Manager can control P/T/Z and preset positions from the SPD-160 or the B-101. Cam Manager allows you to view and record images from any WebGate product. View and control images from the WebEye series and the i-Rec series on the same screen! With the Cam Manager you can Monitor, Playback, Quick Record, Schedule Record, Schedule Back-ups, and Trace Alarms all through a single computer.Add to Compare
Browse CCTV Software
CCTV software products updated recently
In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule. This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace. Strong and smart security ecosystem While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future. Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimise their operations, and secure their network. 1)Protect your people Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models. This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly. Integrating platform Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example: With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building. Leveraging AI and machine learning Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes. When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimise congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively. All of this is powered by a security ecosystem that can help a business better protect its people while realising other benefits in the process. 2) Safeguard your assets Businesses are concerned about the security of their assets when it comes to the hybrid workforce model Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach. This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations. As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely. Remote management and visibility This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic. These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more. Loss prevention strategy When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more. For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits. 3) Optimise your operations The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimise their operations – especially now with the challenges posed by price inflation. A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more. Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs Cloud video surveillance systems For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition. However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilised, and an additional 20% aren’t even aware that it could be used in other ways. AI and analytics The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimise their operations, helping their business to operate more effectively and efficiently. The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience. 4) Secure your network Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats. Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behaviour. Cybersecurity software For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behaviour, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach. A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defences so that they can avoid downtime and continue to operate with peace of mind. Prepare your business for the future Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem. With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimising operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence.
Technology has certainly become an intrinsic part of our day-to-day lives, from the retail industry, to food and beverage outlets, and even within the health and fitness industry. It’s all around us, in varying formats, making processes more efficient. It has refined some of our older approaches, and in the hospitality industry, this is certainly true. Technological advances are leading the way forward for the future of hotels, and with the sector now free from COVID-19 restrictions, venues are looking for ways to improve the guest experience with technology. A staggering recent statistic has suggested that 75 percent of activities in hospitality could one day become automated — so where exactly are we heading on this journey into the future of hotels? Join Cairn Collection, owner of The Stirling Highland, and explore a whole host of innovations that are changing the face of hotel management systems. The 21st-century check-in desk The breadth of technology that is slowly becoming more widely available is transforming the hospitality industry The digital age is constantly finding new ways to innovate and prove its value and worth for modern consumers, and the breadth of technology that is slowly becoming more widely available is transforming the hospitality industry. In the past, connotations of a check-in desk were long queues and excessive pieces of paper — from room service menus to a mini catalogue of highlights of the local area. Technological innovations such as face recognition are one of the major ways that this process is changing. Using artificial intelligence A handful of hotels have already trialled or introduced artificial intelligence (AI) into their daily running, and it looks set to become far more mainstream by 2025. From paying the bill by using biometrics to allowing hotel managers to handle data more efficiently, AI looks set to be welcomed with the potential for it to reduce costs by 13 percent. The entire hotel check-in process could become automated, making one of the most established parts of the hotel experience redundant — but staff could be freed up to engage with customers, allowing them to get into their rooms quicker in the meantime. Many venues have even gone fully paperless when it comes to checking in, choosing instead to upload the process to cloud computing systems where information can be stored and viewed by connected devices. Convenience is the key More hotels operate their room unlocking facilities through mobile phone-connected technology, NFC After having checked in to a hotel, guests will want to explore the room that they’ve booked. Doing so has never been easier, and the classic magstripe locks which were once the most commonly used method of accessing hotel rooms are being progressively phased out. More and more hotels now operate their room unlocking facilities through mobile phone-connected technology, near-field communication (NFC). This technology allows for data transfer at up to 424 kb per second, and it is enabled when connected devices come into contact with each other. Mobile key systems Most mobile key systems require guests to download and activate a key through the hotel’s digital app, and upon arrival, they can use the activated key to unlock the door to their hotel room. Combined with online/digital check-in services, guests can use the e-key to check in early or at a time that suits them best, knowing that they don’t have to wait around to pick up a physical key. Small touches like this build a sense of brand familiarity for customers, as well as streamline their hotel experience, and this distinguishes them from competitors. Hotel management systems Hotel management systems need to account for the experience that guests have while staying at the venue Of course, hotel management systems also need to account for the experience that guests have while staying at the venue and technology can do a lot to enhance this. Hotels have to innovate the spaces that they are presenting to their customers and technology has become a valuable asset to help enhance customer satisfaction, as the hotel room is certainly not simply a place for rest anymore. Voice-enabled devices Voice-enabled devices are becoming common features in rooms, with popular models such as Google Assistant, Apple’s Siri, and Amazon Echo providing guests with information on the local area — if you’re looking for the perfect backdrop to the business dinner you’re attending, just ask Alexa! Hotels could even record and distribute their personalised voice messaging to help reinforce the brand presence into the technology. Technology can help you attract and retain customers by offering services above and beyond what they’d usually receive A room and then some As the generational switch to millennials and Gen Z continues, the need for an experience has grown and, through a mixture of technology, hotels can cater to these revised consumer needs. From setting up messaging platforms to providing a remote control that monitors absolutely everything in the room — from atmospheric mood lighting to music streaming services and more, a hotel room can be whatever the user wants, and the experience is therefore generated by the customer. Technology doesn’t stop advancing, and there are constantly new, refined approaches to hotel management systems that have marked a stark departure from ways of the past. With guests returning after over a year of COVID-19 restrictions, competition for their business is even tougher. Technology can help you attract and retain customers by offering services above and beyond what they’d usually receive.
As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders. In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero. Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually. Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.” Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.” “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.” Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs. Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.” A simple but effective fraud Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes. A primary risk is SIM Box fraud. SIM Box fraud SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal. The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.” While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box. Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.” Is it illegal? If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service. For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.” “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.” Other telecommunications fraud Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market. While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion. The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.” “The call starts as a dialled telephone call, but the user receives it within an OTT app. If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.” Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.” According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”. This is defaulted to “on” when the app is downloaded. Only the most technologically savvy users would even know it was there. Combatting the fraud against networks Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud? The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.” “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible. This has led to a mindset where whatever the questions the answer is always more marketing promotions.” A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return. An opportunity for the future As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.”
The HDcctv Alliance will be exhibiting on booth 18140 at ISC West Surveillance video standards organisation the HDcctv Alliance will provide the security industry with its first look at the new generation of HDcctv 2.0 surveillance technologies and products at ISC West 2014. The Alliance recently ratified the HDcctv 2.0 standards, which have been developed and agreed for equipment able to produce high-fidelity HD video without transmission delay and without the need for IP cameras or Ethernet cabling within a secured premises - meaning a significant cost-saving in many surveillance systems. At ISC West 2014, five members of the Alliance - Dahua, Eyenix, Intersil, WEBGATE, Telecom & Security and GenIV - will showcase new, HDcctv 2.0-related technologies and equipment. Todd Rockoff, HDcctv Alliance executive director, said: "There are two primary variants of HDcctv 2.0 - NR and AT. HDcctv 2.0 NR DVRs and cameras add plug 'n' play remote control up-the-coax to the underlying HDcctv 1.0 format. HDcctv 2.0 AT, based on HDCVI technology, delivers HDTV signals over any legacy CCTV coaxial cabling, along with the plug 'n' play remote control capability. Both variants offer significant advantages over HD-SDI transmission." Companies exhibiting on the HDcctv Alliance booth at ISC West 2014 are: Dahua - A world-leading advanced video surveillance solution provider and the inventor of HDCVI technology. The company's product portfolio includes a full system series of front-end, back-end, and display equipment, as well as software and intelligent traffic solutions. Intersil - Intersil Corporation is a leader in the design and manufacture of high-performance semiconductors for HDcctv DVRs, delivering a variety of high-performance digital HD solutions. WEBGATE - WEBGATE is the world's #1 manufacturer of HDcctv-compliant DVRs, cameras and converters. Moreover, through its extensive experience in defence industry projects and investment in R&D, WEBGATE has built "We're very excited about HDcctv 2.0 and the flexibility it offers both end users and installers" a strong reputation for innovation and reliability in security systems integration. Eyenix - Eyenix manufactures world-class Image Signal Processors for HDcctv surveillance cameras, providing security cameras with a total solution for capturing, analysing, and transmitting HD video. Telecom & Security - Innovative Italian manufacturer of coaxial connectivity products for the security industry, focused on simple, re-usable, and effective termination solutions for coaxial cable-based installations. GenIV - Provider of full range of advanced-technology HD surveillance equipment for the North American market. Yin Jun, Director of R&D at Dahua, said: "We're very excited about HDcctv 2.0 and the flexibility it offers both end users and installers. HDcctv 2.0 AT, in particular, provides the means to upgrade any analogue system to HD quality video with remote control without disturbing the legacy infrastructure." Jon Hwang, CEO of Eyenix, said: "Those responsible for designing and specifying surveillance systems are now able to work with HDcctv as easily as they worked with analogue CCTV 10 years ago. Certified HDcctv-compliant products from a variety of manufacturers will always interoperate, without the need to test all pair-wise combinations. This means convenience, peace of mind, and freedom of choice for installers and end users." Leslie Park, WEBGATE Marketing Director, said: "The plug 'n' play remote control of HDcctv-compliant products reduces the costs of installation and operation. WEBGATE anticipates being among the first companies to offer HDcctv 2.0 NR-compliant equipment." At ISC West 2014 the HDcctv Alliance will be exhibiting on booth 18140, where visitors are encouraged to meet Alliance members, see the latest HDcctv technology in operation, and discover more about the benefits of HDcctv 2.0.
ONVIF is a forum which drives the development of a standard global interface for network video productsONVIF has recently announced that its member base has grown to 103 companies. The forum, which drives the development of a global standard for the interface of network video products, now boasts 12 full members, 13 contributing members and 78 user member companies. Over the last months, Canon and IDIS have joined as full members and Dallmeier, General Electrics, Genetec, Hitachi, Industrial Technology Research Institute, ITX, Nice, Optelecom-NKF, PMC-Sierra, Sanyo and Webgate are participating as contributing members. In line with ONVIF's Rules of Membership, the forum held an election for the committee seats at its Annual Meeting in Anaheim, California on September 23. As a result, Siemens is now a new member of the Steering Committee, Panasonic has been re-elected for both the Steering and the Technical Committee, and Cisco has been re-elected for the Technical Committee. In the Technical Services and Communication Committee, open seats were filled by Anixter and Hikvision respectively. The new committee members will start their work in November in conjunction with ONVIF's first anniversary. "Reaching 100 members is a huge milestone for ONVIF and clearly shows the importance of global interoperability and standardization for our industry," says Jonas Andersson, Axis Communications, Chairman of ONVIF's Steering Committee. "We welcome all the newly elected members to the ONVIF committees and look forward to their contributions for another productive year for ONVIF. "As further evidence that the ONVIF specification is now being rapidly taken up by the industry, several companies have recently announced ONVIF-conformant products. A complete list of products as well as member companies can be found at http://www.onvif.org/.
Related white papers
Connected video technology for safe cities
Video Surveillance as a service: Why are video management systems migrating to the Cloud?
The borderless control room
14 success stories about how video technology is improving city lifeDownload
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Webcast: Access control integration increases security while reducing costsDownload