IDTECK access control video surveillance management system - iDWATCH SOFTWARE
IDTECK access control video surveillance management system - iDWATCH SOFTWARE

IDTECK has recently released iDWATCH integrated management software, which provides high level of security by integrating video surveillance with access control system.iDWATCH Series is a total security software package that supports real-time confirmation of the access control status with visual monitoring and guarantees a high level of security at low installation cost. Access control events and video images are both stored on the PC hard drive, where the integrated management software is installed, and DVR to preserve the data safely and also make it easy to search the video images.iDWATCH Series provides easy and smart search functions such as searching data by event categories, event conditions and remote integrated monitoring support for multi site management. Moreover, the software supports high system expandability and smooth integration with other systems such as alarm & fire panel integration. This software also provides various total security solutions for businesses of various sizes.Expandable modular system for large-size business (iDWATCH VIEW PRO)iDWATCH VIEW PRO can be easily added on to access control (STARWATCH ENTERPRISE & STANDARD) and time & attendance (STARWATCH TIME PRO & TIME BASIC) management software.DVR and management software distributed system for medium-size business (iDWATCH IAD PRO)iDWATCH IAD PRO I/II supports the networking of multiple DVRs (Distributed installation of DVR and management software) with the access controller for medium/ large business management and allows multi-site management and monitoring using the server/ client support.DVR and management software all-in-one system for small-size business (iDWATCH IAD BASIC)iDWATCH BASIC I/II is an integrated security management software package, which is designed to centrally monitor video surveillance and access control; suitable for small-size businesses. This software is offered in a standalone system (DVR with embedded management software) and when installing several DVRs, it allows integrated video monitoring using the iDWATCH CMS. For more details, visit our homepage.

Add to Compare

CCTV software - Expert commentary

The global biometrics trends review
The global biometrics trends review

The global biometrics market has been recently developing rapidly, and this trend will continue shortly. If in 2018 its volume was estimated at $23.4 billion, according to the forecast of the analytical company BCC Research, the market size may increase to $71.6 billion with an average annual growth rate of 23.2 % by 2024. Fingerprint scanning, facial recognition, iris, vein, and voice technologies are expected to be implemented at the fastest pace. The analysis is based on the revenue indicators of key players depending on segments, including hardware, software, and integration. Biometric electronic documents Another analytical Agency, Acuity Research, estimates that the number of biometric electronic IDs will increase by about 3.5 billion electronic documents in the world. Moreover, more than half of the UN member States issue biometric passports. Government and private contracts of Canada, the United States, Belarus, Ukraine, Moldova, Lithuania, Hungary, Bangladesh, Senegal, and other countries are examples of implementation of programs for the transition to biometric electronic documents. Government organisations in various countries believe that biometrics is one of the most effective ways to identify refugees and those who cross the border. Now there are a lot of projects which are based on biometric technology. Biometric identification system Perhaps one of the most ambitious is the Aadhaar project being implemented in India Perhaps one of the most ambitious is the Aadhaar project being implemented in India. It is a biometric identification system that contains the data of more than a billion people. The database contains about 10 billion fingerprint templates, two billion iris templates, and a billion photos. There is another ambitious project at the Nairobi Jomo Kenyatta International Airport, where RecFaces company has implemented a passenger facial identification ready-made solution, that helps the security guards to receive notifications about airport visitors in just a few seconds and increase the efficiency of security services at least by 30%. The introduction of biometric identification of passengers aimed at increasing the level of airport security, as well as quickly obtaining information about the detection of wanted persons, stored in the long-term archive. Automated control gates As another example, face match is used at border checks to compare the portrait on a digitised biometric passport with the holder's face. In 2017, Thales company was responsible for supplying the new automated control gates for the system of Automated Fast Track Crossing at External Borders at Roissy Charles de Gaulle airport in Paris. This solution has been devised to facilitate evolution from fingerprint recognition to facial recognition This solution has been devised to facilitate evolution from fingerprint recognition to facial recognition during. Governmental systems, SmartCity, airports projects using identification technologies day by day become our reality and influence the growth of the biometrics market globally. Countries are studying the experience of each other and adopting it. Paperless payment technologies The global market of biometrics will shift all industries, starting from the transportation facilities especially airports, where a transition from traditional VMS and ACS to paperless biometric self-Boarding systems will be carried out. Sports facilities will see the development of paperless payment technologies at cash desks, and the banking sector — the payment systems with remote customer identification. HoReCa will transfer from staff time tracking systems to biometric payment systems, biometric check—in systems and the use of biometric identifiers. To sum up there are two most significant drivers of this growth are surveillance in the public sector and numerous other applications in diverse market segments.

Safer Streets require real-time video analytics
Safer Streets require real-time video analytics

The UK government recently announced a doubling of the Safer Streets Fund to £45 million, as it seeks to reassure the public that safety is a top priority, as the night-time economy makes a return. More than just surveillance While this funding increase is much needed, it’s vital that the government and local councils use the money strategically, or risk missing out on a great opportunity to deliver real change and enhance safety across the United Kingdom. One of the main strategies cited by the government is to increase the current vast number of CCTV cameras installed across the country, despite the fact that the UK is already one of the most surveilled nations in the world. Investing in video analytics London alone has around 700,000 cameras, but to effectively monitor them all would be an incredibly inefficient use of manpower and require a huge number of staff. Therefore, I believe the clearest and most cost-effective way for this project to succeed in its overall mission, is by investing in smarter technology, such as video analytics. Incorporating video analytics into existing infrastructure is the clear solution This technology offers a more efficient use of resources, faster response times and enables more informed, time-critical decision making, when reacting to unfolding events in real time. Incorporating video analytics into existing infrastructure is the clear solution, as the technology enables legacy assets, such as analogue CCTV cameras, to become more than just after the fact evidence gathering tools and instead be used to help enhance real-time responses to unfolding incidents. Artificial intelligence-enabled solutions Artificial intelligence-enabled solutions are trained using vast datasets of images and video footage, in order to better understand people, objects and vehicles that are captured on film, and they continue ‘learning’ and improving, while in use. The system’s algorithms analyse and prioritise input from video data to decide which inputs are of value, automatically classifying the footage and notifying security personnel accordingly. This reduces response times by notifying CCTV operators of an incident, as it happens, meaning law enforcement and security personnel can react faster and intervene in an ongoing situation. Edge technology and real-time video streaming A key consideration should be choosing a technology that can operate at the edge and deliver real-time video streaming, even at the lowest bandwidths, so it isn’t limited to use in areas with good connectivity, which would exclude most remote areas. Quality really does matter and technology that can operate over low bandwidths is crucial for allowing operators to zoom in on areas of interest, such as a car number plate or face, and retrieve full-resolution images that can make a real difference in ongoing investigations. Analytics-based security approach Introducing an analytics-based security approach would also help curtail the rising cost of tackling crime Introducing an analytics-based security approach would also help curtail the rising cost of tackling crime. Research conducted by the UK’s Labour Party recently found that the annual cost of crime reached a staggering £100 billion. While statistics show that crime rates in general have been fairly stable over recent years, experts point to the increase in specific types of violent crime, such as knife crime which rose by over 20% during 2020. Implementing smart analytics-based technology Implementing smart analytics-based technology would help maintain staffing costs, as the system can identify incidents without an operator’s input, as well as reducing the cost of managing crime, as more incidents will be intervened in before they escalate too far. This dramatically reduces the burden on staff and allows a single surveillance operator to monitor many more cameras. On the other hand, this level of automation also reduces false alarm fatigue and operator overload, which can quickly sap efficiencies and reduce operator alertness, if left unchecked. Data driven problem-solving approach to crime prevention Procurement officials should avoid the common mistake of simply doubling down and throwing more staff and security assets at the problem to bring results. Instead, they should take a more data driven problem-solving approach to crime prevention by leveraging technologies that can enhance response and preserve their existing investments in cameras. The smart use of real-time video analytics could make the difference by preventing dangerous situations from escalating into serious incidents.

Tackling the challenge of the growing cybersecurity gap
Tackling the challenge of the growing cybersecurity gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and centre on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilising system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralised location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Latest IDTECK Co., Ltd. news

Nedap’s uPASS Reach readers give hands-free elevator access at VNPT headquarters
Nedap’s uPASS Reach readers give hands-free elevator access at VNPT headquarters

Nedap’s uPASS Reach long-range UHF readers in combination with IDTECK elevator384 access control system were installed To optimise the monitoring and management of all vehicles and people access points at the company’s headquarters, the Vietnam Post and Telecommunication group (VNPT) recently upgraded the building’s entire access control and surveillance system. Nedap’s uPASS Reach readers were selected to facilitate hands-free access and elevator management. Located in central Hanoi (Vietnam), VNPT is one of the largest companies of the country. With 1,000 employees working at the HQ, manageable vehicle and people access control systems are needed to guarantee a convenient and secure flow of people. The entire project included access control readers for automatic vehicle identification at the building’s parking facilities, elevator management and hands-free door access. Elevator management In order to control the 6 passenger elevators in the building’s 27 floors, Nedap partner Techpro successfully installed Nedap’s uPASS Reach long-range UHF readers in combination with the elevator384 access control system of IDTECK (Korea). Only people with an authorised access credential can operate elevators with call buttons. All exit doors at the stairs are also equipped with Nedap's uPASS readers for tracking purposes. With this solution, VNPT ensures convenient and secure hands-free elevator access to all of its authorised employees and registered visitors. Nedap’s uPASS Reach offers long-range identification up to 5 meters [16 ft] using the latest UHF technology. Based on battery-free, passive technology, the uPASS Reach reader is a cost effective and enduring solution for hands-free building and parking access. Convenient building access By using Combi cards featured with UHF and Mifare technology, VNPT facilitates a one card solution for employees and visitors, allowing them authorised access to the 184 doors and elevators throughout the entire premises. Employees and visitors benefit from using a single access credential throughout the facility, from the car park to their office door, making it a cost efficient identification solution. Excellent results Techpro Co. Ltd. Director, Mr. Do Duc Hau, is pleased with the excellent results of the system. “The system has been working well since its completion in 2013. The system helps the company and visitors to enjoy a well-managed elevator system, and provide people tracking and time attendance. With 1000 employees and visitors in the buildings 27 floors, before the installation, the elevator system was always busy and it took a long time to call an elevator. Additionally, it was hard to manage the working time of the employees. With the new systems this is not an issue anymore. As one of biggest telecom providers in Vietnam, with hundreds of daily visitors it was often a burden to manage visitors in and out for VNPT’s security department. The new installation helps to conveniently grant access to authorized visitors to the right floor and the right department. Visitor information can now also be stored and provide support for management purposes”.

IDTECK FINGER007 prevents 'Buddy-Punching' through its time and attendance system at Saudi Aramco
IDTECK FINGER007 prevents 'Buddy-Punching' through its time and attendance system at Saudi Aramco

 IDTECK's FINGER007, professional T&A Software has been integrated to manage precise time and attendance dataArabian American Oil Company also known as Saudi Aramco is government-owned national oil company of Saudi Arabia. It is the largest oil corporation in the world with the largest crude oil reserves and production. Running over 100 oil and gas fields in Saudi Arabia, the company produces over 3.4 billion (540,000,000 m³) barrels of crude oil annually.In order to manage the large group of employees in their branch offices all over Saudi Arabia, the HR department of the Saudi Aramco headquarter office needed to retool its time and attendance system to reduce the payroll costs as well as the effectiveness in management. This included a prevention method for unauthorised overtime and card misuse. There were many cases of "buddy punching", which refers to the act of clocking in for other employees who might be late or absent. In addition, the time and attendance system had to integrate with their existing payroll and HR management system to apply payroll rules that are consistent and fair to every employee.IDTECK's distributor in Saudi Arabia region, Aflak Electronics Industries Co., has introduced FINGER007 access controller integration with T&A Software for precise time and attendance of their employees.IDTECK's intelligent standalone fingerprint access controller, FINGER007, delivers top of the line time & attendance and access control applications in a single device. High user efficiency is guaranteed as various identification modes; fingerprint, proximity card and PIN (Personal Identification Number) are supported. Arabian American Oil Company also known as Saudi Aramco is government-owned oil company of Saudi Arabia Best of all, fingerprint identification eradicates any possibilities of proxy attendance, which has known to be the weak point of proximity card T&A devices as the employees can generate false T&A data by using someone else's card to record clocking in and out time.Working alongside with IDTECK's FINGER007, professional T&A Software has been integrated to manage precise time and attendance data. IDTECK's Software Development Kit has been utilised to create one of a kind T&A software, which reflects user's request and regional characteristics. The T&A Software collects T&A data from FINGER007 for further processing and analysis to generate meaningful attendance reports. The software allows users to run multiple shifts and various work schedules without any manual calculations. Processing time, which used to take hours with conventional time clock T&A system, has reduced to just few simple clicks of a button.After the successful implementation of the new time and attendance system, the HR department of Saudi Aramco has been able to realise numerous benefits and satisfaction on their investment. The HR department of Saudi Aramco was pleased with how the time and attendance system reduced their payroll process. They no longer had to calculate employee time and input data in to the payroll system manually. Employees also achieved an immediate benefit by eliminating the need for employees to carry around RF cards or remember password numbers. Using only their fingerprint, employees can identify themselves more quickly and precisely.

IDTECK chosen to update the access management at the TOBB University
IDTECK chosen to update the access management at the TOBB University

 IDTECK access control system has ensured safety at TOBB Economics and Technology UniversityTOBB Economics and Technology University, located in Ankara, the capital city of Turkey, is one of the largest technical institute in its region. School's new dormitory building is a signature space that supports the academics and personal growth of residents, provides a place where programmes and events are hosted, and most importantly, provides a home-away-from-home for 1,500 students. The student dormitory complex is consisted of 4 block buildings, which are respectively 18 stories high.Staying the dormitory provides a lot of benefits to the students. It offers convenient access to classes and campus events and most importantly, it provides much needed security to the students that are living away from home for their first time. Nevertheless, Dormitory buildings go through constant exposure to students, faculty, staffs and in some cases, unwanted solicitors and intruders. It is the responsibility of the university to present safe atmosphere where students could study and socialise with one another as well as privacy during their own hours. This is promoted as better describing a living and learning community that is part of the larger academic institution.As the school officials requested, all the entry doors of the dormitory buildings are remained locked all times to prevent the entry of the unauthorised personnel. 118 units of SR10 SMART Card readers were installed on every entry doors and students are allowed access if they present their access card to the reader. 34 units of iTDC-SR access control panels, which are capable of controlling up to 4 doors, are deployed to control the readers. ELEVATOR384 verifies the user and activates the buttons for the floors the student is permitted In addition, properly securing the elevator systems has helped eliminate the risk of the misfortunate events from taking place. With the SR10 SMART Card reader installed right below the floor button of the elevator, students must present his or her access card to the reader and the elevator system, ELEVATOR384, verifies the user and activates the buttons for the floors the student is permitted to. Accessible floors can be set for each card holder (student) by the system administrator and they were able to monitor all the floors. Elevator control played a large role in establishing a comprehensive Access Control System.A key part of this project was that the students didn't have to replace their existing student identification card with a new card equipped with access card capability as the access control system as well as the elevator control system was compatible with SMART Card (MiFARE).On this large project, IDTECK's Turkish distributor, Optimum Guvenlik, was able to beat out other access control suppliers due to the great performance of the IDTECK product. Their recent project at the Ministry of Foreign Affairs of Turkey was a great success and it has left a great impression for Optimum Guvenlik and IDTECK products. Students and dormitory personnel were fairly satisfied with the IDTECK access control system as it ensured safety and provided better environment to live and work.

Related white papers

Monitoring traffic flow: Everywhere, all the time

Delivering a smart, secure and healthy workplace with cloud

Cloud video and smart cities