Vanderbilt CCTV Software(15)
Contact traceability reporting is the latest feature to be added to ACT365, the cloud-based access control and video management system. The latest feature to the award-winning cloud system helps system-users adhere to new health and safety standards due to COVID-19. For instance, thanks to contact traceability reporting, users of ACT365 can now successfully: Track potentially infected employees and the doors they enter. See people who entered the same door/room. Contact any employee with details from an exported Excel report via ACT365. Monitor doors that require cleaning or disinfecting. ACT365’s contract traceability reporting helps businesses create a safer and cleaner environment for their staff. System users can now remotely monitor their office from anywhere in the world, including tracking international travelers to their site. How it works: Once an employee tests positive for COVID-19, the office manager can trace their movements within the building during a filtered timeframe. This can be achieved by entering the employee’s cardholder ID details into ACT365 and generating a contact traceability report. This report can be downloaded to Excel, and the manager can identify all doors the infected employee entered in the past two weeks. Other employees who also entered those rooms can also be traced and contacted to inform them to self-isolate. Affected doors can also be identified and cleaned.Add to Compare
Browse CCTV Software
CCTV software products updated recently
The sound of sirens in the distance is commonplace, nowadays. Whether related to a medical emergency or everyday crimes, such as theft, property crimes, and so on, we’re all accustomed to hearing these sirens by now. It is worth noting that many incidents that police respond to take place at night. According to a recent report by the Sleep Judge, more than half of murders, manslaughter, sexual assaults, robberies, aggravated assaults and motor vehicle thefts happen long after the sun has set. To anyone looking to address the round-the-clock security challenge, deploying the most comprehensive surveillance solution is a must, and this means, looking at the instrumental role illumination plays in video capture. Limitations of traditional video surveillance For surveillance cameras relying on video analytics and artificial intelligence (AI) to deliver functionalities such as facial recognition, license plate reading and motion detection, nighttime crimes can pose something of a problem. Without adequate illumination, images from video cameras are grainy and unusable.If surveillance cameras can’t be used to prevent, detect and/or resolve crimes that occur in these areas, the entire security operation is obsolete Without proper lighting, potential criminals and moving objects essentially become indistinguishable, at night, thereby inhibiting even the most advanced security technologies. This limitation of traditional surveillance technology not only hinders immediate police response, but it also stops crime investigations dead in their tracks. Often, without video evidence that is clear and discernible, conviction in a court of law is next to impossible. A common response to this issue is to place security cameras near streetlights or well-lit areas. After all, according to NPR, street lights are effective in deterring crime, as “there are people such as neighbors, pedestrians, or police, to actually see suspicious activity.” However, even if streetside and primary entrances are well lit, the areas that still need most to be surveilled are rear or side doorways shrouded by darkness, unlit back alleys, and so on. If surveillance cameras can’t be used to prevent, detect and resolve crimes that occur in these areas, the entire security operation is obsolete. Best-in-class security solutions must be able to see everything, day and night. A purpose-designed illumination solution Addressing this issue is easier than you might think. Much like a human eye needs some sort of light to “see,” so does video surveillance technology. Integrating external illuminators into a security solution can optimise camera performance exponentially, expanding a camera’s video capture and coverage abilities and ensuring the operation of video analytics, day and night. Opting for an external illuminator allows system integrators to select a device that matches the exact emission range of a camera’s field of view (FOV). The result is an evenly lit visual field, where captured images are clear and effective for security purposes. The two most common options available to integrators include infrared (IR) and white light illuminators. Each technology is built to optimise particular deployments, depending on their needs. Infrared versus white light IR illuminators emit IR light, which is invisible to the human eye and perfect for covert surveillance operations. When cameras need to be able to detect potential threats over long distances, IR illuminators are perfect for the job as they typically have longer emission ranges. IR illuminators are optimal for surveillance operations in license plate recognition, border patrol, safe cities, theme park, and medical sleep lab applications.Cameras deployed without proper illumination are rendered blind, especially at night If an end user needs to implement full-color video analytics for identification purposes, such as facial, object and license plate recognition, white light illuminators are undoubtedly an integrator’s best bet. IR illumination and traditional thermal security cameras, after all, are only able to provide black-and-white images, whereas object recognition software often identifies objects based on their color. White light illuminators installed alongside AI-powered surveillance cameras enable enhanced video image clarity, which, optimises video analytics performance. When customers want to physically deter suspicious activity, deploying white light illuminators is effective. A recent study out of Crime Labs New York found that businesses that deployed visible lights to deter crime “experienced crime rates that were significantly lower,” which “led to a 36 percent reduction in ‘index crimes’”. On top of all this, LED based white lights operate at low running costs and typically have long lifespans, saving end users thousands of dollars a year in energy costs without having to sacrifice surveillance optimisation. External versus built-in illumination Security customers looking to use lighting to deter crime and improve the performance of video surveillance may consider “all-in-one" solutions, as some cameras have LEDs (light emitting diodes) built into them. These LEDs typically encircle the lens and therefore shed light in whatever direction the camera is pointed. However convenient these may seem, built-in illumination can cause problems. First, LEDs built into cameras and next to other electronic components often cause heat to build up, which attracts insects that can trigger motion detection and obstruct a camera’s view. This heat buildup also shortens the LED lights lifespan. Built-in LEDs also tend to create “hot spots” with glare and reflection back into the camera, often because these lights only cover a 30-degree field of view (FOV), even though the average camera’s FOV is 90 degrees. This issue can severely limit a camera’s visibility, essentially rendering those remaining 60 degrees dark and unusable. All in all, when integrating lighting solutions into your security deployment, a cost-effective solution that enhances a camera’s video capture and coverage abilities, are external illuminators because they offer flexible choices of field of view and distances. Best-in-class security solution When it comes to criminal conviction in a court of law, “seeing really is believing.” Cameras deployed without proper illumination are rendered blind, especially at night, just as any security officer would be when patrolling the same unlit area. To guarantee end users the most reliable and highest performing security solution, consider integrating best-in-class illumination into your offerings.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyse more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analysed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analysing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as licence plate reading, behavioural analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fibre-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Securing Intelligent Transportation Systems (ITS) in the transportation industry is multi-faceted for a multitude of reasons. Pressures build for transit industry players to modernise their security systems, while also mitigating the vulnerabilities, risks, and growth-restrictions associated with proprietary as well as integrated solutions. There are the usual physical security obstacles when it comes to increasingly integrated solutions and retrofitting updated technologies into legacy systems. Starting with edge devices like cameras and intelligent sensors acquiring video, analytics and beyond, these edge devices are now found in almost all public transportation like buses, trains, subways, airplanes, cruise lines, and so much more. You can even find them in the world’s last manually operated cable car systems in San Francisco. The next layer to consider is the infrastructure and networks that support these edge devices and connect them to centralized monitoring stations or a VMS. Without this layer, all efforts at the edge or stations are in vain as you lose the connection between the two. And the final layer to consider when building a comprehensive transit solution is the software, recording devices, or viewing stations themselves that capture and report the video. The challenge of mobility However, the transportation industry in particular has a very unique challenge that many others do not – mobility. As other industries become more connected and integrated, they don’t usually have to consider going in and out or bouncing between networks as edge devices physically move. Obviously in the nature of transportation, this is key. Have you ever had a bad experience with your cellular, broadband or Wi-Fi at your home or office? You are not alone. The transportation industry in particular has a very unique challenge that many others do not – mobility Can you trust these same environments to record your surveillance video to the Cloud without losing any frames, non-stop 24 hours a day, 7 days a week, 365 days a year? To add to the complexity – how do you not only provide a reliable and secure solution when it’s mobile, travelling at varying speeds, and can be in/out of coverage using various wireless technologies? Waiting to upload video from a transport vehicle when it comes into port, the station, or any centralised location is a reactive approach that simply will not do any longer. Transit operations require a more proactive approach today and the ability to constantly know what is going on at any given time on their mobile vehicles, and escalate that information to headquarters, authorities, or law enforcement if needed; which can only occur with real-time monitoring. This is the ultimate question when it comes to collecting, analysing, and sharing data from mobile vehicles – how to get the video from public transportation vehicles alike to headquarters in real time! Managing video data In order to answer this question, let’s get back to basics. The management and nature of video data differs greatly from conventional (IT) data. Not only is video conducted of large frames, but there are specific and important relationships among the frames and the timing between them. This relationship can easily get lost in translation if not handled properly. This is why it’s critical to consider the proper way to transmit large frames while under unstable or variable networks. The Internet and its protocols were designed more than two decades ago and purposed for conventional data. Although the Internet itself has not changed, today’s network environments run a lot faster, expand to further ranges, and support a variety of different types of data. Because the internet is more reliable and affordable than in the past some might think it can handle anything. However, it is good for data, but not for video. This combination makes it the perfect time to convert video recording to the Cloud! Video transmission protocol One of the main issues with today’s technology is the degradation of video quality when transmitting video over the Internet. ITS are in dire need for reliable transmission of real-time video recording. To address this need a radical, yet proven, video transmission protocol has recently been introduced to the market. It uses AI technology and to adapt to different environments in order to always deliver high quality, complete video frames. This protocol, when equipped with encryption and authentication, enables video to be transmitted reliably and securely over the Internet in a cloud environment. One of the main issues with today’s technology is the degradation of video quality when transmitting video over the Internet Finally, transportation industry has a video recording Cloud solution that is designed for (massive) video that can handle networks that might be experiencing high error rate. Such a protocol will not only answer the current challenges of the transportation industry, but also make the previously risky Cloud environment safe for even the most reserved environments and entities. With revolutionary transmission protocols, the time is now to consider adopting private Cloud for your transportation operations.
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realised ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”
Enterprise-level security requires a streamlined approach to access management — and for many of organisations, having a single-source location for integrating a facility’s access control technologies, digital video and alarm monitoring systems is the ideal approach. This is where the Vanderbilt Enterprise Security Management System (SMS) shines. But what else can SMS do for customers? Additional screening measures Here are five little-known functions and facts that one may not know: SMS Web - The ability to access the system from anywhere to allow simple day-to-day tasks like quickly opening a door, blocking a cardholder or granting access as an operator is crucial in threat landscape. SMS Web, which is included with SMS software, allows more freedom to control real-time access-related response. Vanderbilt has long been a partner of access control manufacturer Mercury Security Long history with Mercury Security - Vanderbilt has long been a partner of access control manufacturer Mercury Security, which means that for the systems integrator partners, an open-architecture approach supports the long-term success of technology deployments. Vanderbilt customers have the freedom to choose solutions that work best for a specific deployment, an end user’s needs and crucial infrastructure requirements. Mobile credential options - Touchless access control has been a mainstay of the conversations around the challenges of the ongoing pandemic, giving rise to mobile credential demand. Vanderbilt recently launched ACT ID, which provides a free mobile credential option for customers leveraging Vanderbilt’s access control solutions. Data integration - Within SMS, users have the ability to integrate third-party data management platforms, such as housing, human resources and event software, through VI Connect. This eliminates the need for manual updates and cumbersome import/export processes typically required when managing multiple systems. Using VI Connect reduces the workload of system administrators and eliminates costly data entry error. Additionally, VI Connect allows an institution to better leverage the investments made in third-party systems. New way to approach COVID-19 - There are a number of functions within SMS that can be used in COVID-19 protocols and response to help organisations thwart the spread of the disease. Reporting who has accessed a certain area and being able to use this information for contact tracing or controlling traffic and access through a specific entrance for additional screening measures are two ways SMS is being used. As organisations keep looking for ways to prevent the spread of the disease and adapting to a new way of doing business, many are turning to technology to achieve these goals.
Related white papers
Cloud video and smart cities
Security investments retailers should consider for their 2021 budget
Market Report: Cannabis at a glance
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download
Security & Safety Things GmbH deploys IoT platform for smart surveillance cameras at Amsterdam’s Johan Cruijff ArenA
Nedap’s MOOV City Access software combined with long-range RFID and ANPR solutions secure the city of Arnhem’s centre
- Security & Safety Things GmbH deploys IoT platform for smart surveillance cameras at Amsterdam’s Johan Cruijff ArenA
- Nedap’s MOOV City Access software combined with long-range RFID and ANPR solutions secure the city of Arnhem’s centre
- Genetec lands multi-year Changi Airport group security upgrade project
- Genetec, Inc. secures multi-year security upgrade project for Singapore’s Changi Airport Group