Omnicast 4.7, the latest version of Genetec’s IP video surveillance system
Omnicast 4.7, the latest version of Genetec’s IP video surveillance system

Omnicast 4.7 – IP Video Surveillance System Omnicast is the IP video surveillance system of the Security Center, Genetec’s unified security platform. It is the perfect solution for organizations requiring seamless management of digital video, audio and data across any IP network. The release of the latest version Omnicast 4.7 provides an array of new features and enhancements to the system. New Features & Enhancements  Video Trickling: Video trickling leverages the recording capabilities of the edge devices (IP cameras and encoders) by providing the ability to choose and transfer the video from the edge on demand and store it in Omnicast for long-term archiving. This new feature allows for increased recording reliability, bandwidth usage optimization by only transferring video of interest at the right time, and the opportunity to lower costs of remote-site recording by going serverless. HTTPS support: HTTPS support increases security of the edge device communications by encrypting the commands and controls of the cameras. The support for HTTPS is available with all Axis cameras and encoders, fifth generation Sony cameras, and the Genetec extension when supported by the partner. Simplified unit enrolment process: It is now possible to search and enroll cameras by manufacturer name and add units to the system based on a specific IP address range so that multiple units can be added simultaneously, saving considerable time during setup. Support for Axis cameras’ Cross Line Detection feature: Customers can now monitor and handle cross line alarms within Omnicast, and search for cross line alarms directly from the Archive Player. Additional languages: In order to enhance the user experience, Arabic, Persian, Thai and Russian languages have been added to Omnicast 4.7. The user interface has also been adjusted to read from right to left in both Arabic and Persian.

Add to Compare
Hikvision Smart IP Solution 2.0
Hikvision Smart IP Solution 2.0

This amazing and intelligent solution has enriched Smart features, and consists of many innovative, industry-leading IP products. The Smart Solution 2.0 solution is also the ideal choice for various vertical applications.  Enriched smart features Smart IP Solution 2.0 includes Smart features such as object counting, region entering, region leaving, object removing, object leaving, target cropping stream and ANPR (customisation required). Industry-leading IP products New Hikvision IP cameras have been incorporated into this solution, including the DarkFighter series, LightFighter series, 6MP Ultra HD series, 4K series, and new 3MP WDR series, with industry-leading product performance. Versatile solutions Smart IPC and Smart NVRs with Smart features are the perfect solution for small and mid-sized applications. For mid-sized to large-sized applications, iVMS-5200 Professional software further improves the system's effectiveness with Smart features and analytics. Tailored to vertical applications As an all-in-one Smart platform to manage cameras, NVRs, alarms, access control and decoders, the Smart Solution 2.0 is loaded, with Smart features and analytics such as people counting, heating mapping, LPR, and more. This makes it highly adaptable to verticals’ special requirements and can be used in retail, banking, hotel and industrial applications, among others. Enriched smart features Target cropping stream - The third stream of video can be sent to a different source for recording or display in a pre-defined resolution, thus providing more details of a targeted area if needed. Object counting - You can designate an area of interest and let the camera count objects entering or leaving, which include not only humans but also vehicles. It also offers statistical reports. Region enter / exit - This function detects people, vehicles or other objects that enter or exit from a pre-defined virtual region, triggering an alarm. Object left behind / object removed- This function detects objects left or removed from a pre-defined region, the alarm is triggered. ANPR - On-board ANPR analytics allow the ability to detect and recognise a vehicle’s license plate and send ANPR info to a Smart NVR or iVMS-5200P for access management. Supports may vary based on local LPR algorithm development and customisation process required. How does it work? Smart Search: quick retrieval of the camera’s Smart content, such as ANPR or facial recognition. Smart Playback: playback important events in normal speed, otherwise footage will play in 16x quick view. Smart Backup: only store event-based video to maximise storage. Highlighted technology 1. Smart Codec H.264+ optimised compression: An efficient way to benefit manage super high resolution video footage  Analytic + Compression: The moving target is extracted from the static background, using a different codec for each element.  Hikvision H.264+ Smart Codec: In a static night time environment, the bitrate of H.264+ can reach up to 50~60Kbps, 10~20x over standard H.264 codec, that not only saves bandwidth resources, but efficiently decreases storage requirements. 2. ANPR module - The perfect solution for your entrance management.  3. People counting module - Boosts productivity as well as security.

Add to Compare
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012

At the ASIS trade show and conference, Genetec, a pioneer in the physical security industry and a leading provider of world-class unified IP security solutions, showcased the latest advances in its unified security platform, Security Center, which blends license plate recognition (LPR), video surveillance and access control into one easy-to-use platform. Show attendees had the opportunity to climb aboard Genetec's AutoVu Demonstration Vehicle to experience the state-of-the-art in mobile license plate recognition technology, while driving around the streets of Philadelphia.  The newest version of Security Center introduces a host of new features designed to further enhance security events and video monitoring, simplify the system's operation, streamline upgrades and maintenance activities, and help users easily monitor the health of their entire security platform. Also featured in Security Center is Plan Manager, an advanced map-based interface that allows users to create a virtual environment from maps, floor plans, or GIS (geographic information system) maps for all types of sites including cities, neighbourhoods, airports, campuses, industrial sites, and buildings. With Plan Manager, each video surveillance entity (cameras, sensors, doors, alarms, etc.) is represented on the map by an icon. Operators can simply click on these icons to trigger actions such as 'show a camera', 'lock a door', 'execute a macro', 'turn off an alarm', etc. Security Center also features the latest in mobile applications allowing organisations to equip their security personnel with an Apple® iPod touch®, iPhone®, iPad®, RIM BlackBerry® or Android™ Smartphones so that they can monitor and control their security operations over any wireless network, while on the move. At this year’s ASIS, Genetec will demonstrate video playback on smartphones, as well as streaming video from smartphones back to the Security Center for live viewing and recording. Security Center Mobile also features the industry's first platform-independent, universal web client for video, access control, and license plate recognition. The unified web client allows customers to connect back to their platform to view live video streams, control PTZ cameras, configure aspects of their access control and LPR systems, and run reports from most web browsers including Microsoft Internet Explorer®, Mozilla Firefox®, Google Chrome®, and Apple Safari®. Show attendees who were interested in experiencing the latest advances in mobile License Plate Recognition technology were able to sign up to drive around the streets of Philadelphia in the Genetec Demonstration Vehicle, a fully equipped Dodge Charger featuring AutoVu, Genetec's innovative LPR system. AutoVu automatically collects vehicle license plates and alerts the user of issues or infractions and offers a perfect solution for wanted vehicle identification, mobile license plate inventory, or for permit and/or time-limit parking enforcement. Inside the car, on a ruggedized laptop installed for driver use,  was the AutoVu Patroller, a highly mobile, easy to use software designed to automate the verification of vehicle license plates. On the car's body there were several AutoVu SharpX IP-based LPR cameras. Specifically designed for mobile applications, the SharpX IP on-vehicle camera is one of the smallest high-resolution LPR cameras in the world. It provides images with two to three times higher resolution than most other LPR cameras on the market and results in extremely accurate license plate read rates – even in bad weather, at poor angles, and at high speeds.  The trunk of the car housed the AutoVu LPR Processing Unit and Security Center which provided the back-office management capabilities of the system so that in-vehicle users are able to download all the latest hotlists and updates. The in-vehicle patroller application allows users to review all data collected throughout the day while the Security Center operator can monitor reads from all vehicles in the back-end. Wirelessly, or at the end of a shift, all data collected can be synchronized with the organization's central Security Center system for ongoing analysis.

Add to Compare
Milestone releases XProtect Corporate 3.1 with enhanced GUI
Milestone releases XProtect Corporate 3.1 with enhanced GUI

Milestone Systems, the open platform company in IP video management software, today announces the release of XProtect™ Corporate 3.1 with a significant new version of the user interface: Smart Client 5.0. Ground-breaking functionality like the Sequence Explorer investigation tool and independent playback significantly increase efficiency in security operations and investigations.Milestone version 3.1 of XProtect Corporate is powerful IP video management software designed for largescale, mission-critical security implementations, supporting unlimited cameras, users and sites. This release includes streamlined and optimised installation procedures for easier deployment, Management Server Failover using Windows® Server Clustering, plus Windows 7 and Server 2008 R2 support.Watch a detailed introduction to the features and benefits of Milestone's Smart Client 5.0 released together with XProtect Corporate 3.1Even more important news about this release, however, is the innovative version 5.0 of XProtect Smart Client that takes a giant leap forward in usability and functionality. It is available in 20 languages including online help, which extends the software's ease of use around the world.Milestone XProtect Smart Client 5.0 also improves the user experience through an enhanced, adaptable interface that focuses on personalised usability and operational efficiency. The intuitive layout allows users to show only the dialogs preferred or needed for surveillance tasks, or hide them all for a pure full-screen mode of viewing, if desired. In addition to selecting controls on the fly, each user can choose to remove controls from the interface, so only the most relevant ones are displayed. This makes the system interface easier to understand and navigate - especially for new users.With this release, XProtect™ Smart Client features an industry first called Sequence Explorer that previews tiled video from recorded sequences or time intervals from multiple cameras. The Sequence Explorer displays a drag-and-throw wall of video preview images in thumbnails with smooth slider scrolling and easy selection of preview images for closer scrutiny of details. The Sequence Explorer is a powerful new investigation tool to browse through recorded video sequences to find incidents and evidence fast.Milestone XProtect™ Smart Client now also provides video overlay playback controls to view individual cameras in live mode. This means that operators can play back events on one camera without losing track of what happens live. This feature also works in the normal playback mode so operators can see recorded camera images in the view from different times. Overlay buttons can also be added on each camera to facilitate common actions such as triggering events and outputs, using PTZ, and other tracking tasks - all to improve surveillance effectiveness."XProtect Corporate 3.1 with Smart Client 5.0 offers innovative new combinations of tools for improving the user's experience and efficiency on the job, which translates to more rapid response and better security. Independent playback and the unique Sequence Explorer make investigations far easier than ever before, and the adaptable GUI in particular is a game-changer in the surveillance industry that operators at all skill levels will really appreciate," says John Blem, CTO and Co-Founder of Milestone Systems.XProtect Smart Client 5.0 shows up to 100 concurrent cameras in a single view with unlimited numbers of more via carousel and HotSpot windows. Customers can ramp it up with XProtect Smart Wall for large command centre installations, and add even more value through integrated solutions with other systems offered by Milestone Solution Partners.Milestone is revealing XProtect Smart Client in a webinar today at 9 a.m. Pacific Coast time, also shown at the Milestone Integration Platform Symposium that is being held in Hollywood, California. The webinar will be made available for viewing thereafter on the Milestone website.XProtect Corporate 3.1 with the new Smart Client 5.0 will be demonstrated live at the upcoming industry trade shows this spring around the world.

Add to Compare
Milestone Systems XProtect® Expert – Powerful control for advanced surveillance
Milestone Systems XProtect® Expert – Powerful control for advanced surveillance

Milestone XProtect® Expert is advanced open platform IP video management software (VMS) for medium and large installations. Its powerful central management interface allows large systems with multiple Recording Servers to be efficiently managed as one uniform system. Using scheduled and event-driven rules, it is easy to automate security actions and control external systems, reducing the amount of manual tasks. Ideal for daily users and operators who want sophisticated live monitoring, XProtect Expert features efficient alarm handling, multi-layered and interactive maps, and the ability to flag suspicious incidents for later review. Reduce total cost of ownership Central management: Centrally manage all aspects of the surveillance system, such as connected cameras, devices, storage and users from a single client interface Powerful management interface: A wide range of administration tools help ease the initial configuration and daily administration of large systems that are deployed across different geographical locations System Monitor: Gives instant feedback on system performance and enables proactive administration of the system Configuration reports: System integrators can document system delivery and provide a detailed listing of all configuration settings High-performance video recording 64-bit Recording Server: Users can run more cameras on fewer servers helping to save money on total system costs Unlimited system scalability: Full flexibility to add additional Recording Servers and expand the system Edge Storage with flexible retrieval: A redundancy option that ensures continuous recording of audio and video and allows users to control when recordings are retrieved from camera storage based on time schedules and events Versatile rule engine: Easily automate different aspects of the system, such as lights and doors, based on security events or time schedules, eliminating the need for manual control Real-time situational overview Alarm Manager: Single-point alarm function that provides a clear and consolidated overview of security and system-related alarms and gives instant access to cameras for immediate visual verification, decreasing the number of false alarms Bookmarking: Flag video sequences of particular interest and add descriptive notes, enabling users to easily share information and increase efficiency in investigating incidents Interactive maps: Gain a comprehensive overview of camera locations and layouts of an entire surveillance installation, allowing for quick detection of trouble areas

Add to Compare
Dallmeier releases new tutorial videos on viewing software Smavia Viewing Client
Dallmeier releases new tutorial videos on viewing software Smavia Viewing Client

Dallmeier has expanded its portfolio of online tutorials on its YouTube channel and introduced new videos on the viewing software Smavia Viewing Client.  Smavia Viewing Client is a powerful and intuitive software for the convenient evaluation of live and recorded image material via Ethernet. In new “How-To” videos Dallmeier shows how easy it is to use the software and what useful features it offers.  "Live View" This video focuses on live viewing of video material. In the Smavia Viewing Client the cameras are represented in a clear camera tree structure, from which they can easily be moved by Drag&Drop into various split windows. A special highlight are the “flexible split windows”: In addition to predefined split views every user can adapt the software specifically to his or her requirements and define and design split windows individually. A corridor mode can also be set up very easily, since there are no fixed default image layouts such as 16:9 or 4:3. If several monitors are being used it is also possible to start the Smavia Viewing Client in multiple instances. In addition, many other useful features are available to the operator, such as the integration of site maps, an easy-to-use zoom function or pixelisation of moving objects.  "Search and Backup" This video deals with the subject of search and backup. Here Dallmeier introduces the various search functions of the Smavia Viewing Client and explains step-by-step how to efficiently evaluate recorded image material. In addition to a simple search by date and time, other available options include a fast search with user-defined time units and step lengths, an index search for incidents and an extended search for data from external devices such as scanners of cash registers or ATMs. The most efficient evaluation is offered by a search using Dallmeier SmartFinder, a system for intelligent searches for movement within freely definable image areas. Dallmeier uses an example to clearly explain how SmartFinder works. There are also demonstrations of how to create backups of relevant sequences.  Want to learn more? The "Search and Backup" tutorial and other videos can be found online on the Dallmeier YouTube channel.   The Smavia Viewing Client is available for downloading free of charge on the Dallmeier homepage.

Add to Compare
Sony IMZ-NS132M intelligent monitoring software for 32 cameras
Sony IMZ-NS132M intelligent monitoring software for 32 cameras

RealShot Manager Advanced Series is the latest version of Sony’s industry-leading management software - and it takes IP monitoring to a new level. A combination of real-time image processing, automated functions and intelligent video analysis helps detect security threats automatically and reliably. This removes the burden from your surveillance staff - so they no longer have to monitor camera feeds by eye, and they no longer have to search through hours of archived video to find incidents. The latest release builds on the functionality of previous RealShot Manager versions to make it the most advanced monitoring solution available today. Features include: HD-ready - allowing you to migrate to megapixel cameras at your own pace Simple to set up and operate - thanks to easy-to-use wizards and automatic camera detection Open platform - for compatibility with all major camera brands Scalable - from 1-32 camera control, to meet your changing needs Intelligent features including: Intelligent Object Detection and Intelligent Motion Detection, which can trigger alarms, locks and lights automatically Active Intelligence, which highlights suspicious activity on-screen to reduce false alarms Hot-spot monitoring Intuitive drag-and-drop interface RealShot Manager is the perfect tool for managing your current and future IP camera investments. For real quality network security in real time, there’s nothing more advanced.

Add to Compare
RealShot Manager Advance from Sony
RealShot Manager Advance from Sony

GO ADVANCEDThe demand for surveillance systems is growing, and the adoption of IP as a transport mechanism for video is ever increasing. Sony recognised this trend early on, and has been focused on developing products and solutions aligned with it.Now Sony is pleased to announce the introduction of the IMZ-NS100 Series Intelligent Monitoring Software, which can be installed on your own Microsoft ® Windows ® server to monitor and control 1, 4, 9, 16 or 32 network cameras (IMZ-NS101, IMZ-NS104, IMZ-NS109, IMZ-NS116, and IMZ-NS132, respectively).The IMZ-NS100 Series is easy to use and free from complicated operation - users find it simple to set up connected cameras and to set frame rates for recording. They can also easily monitor, search, and play back events with intuitive manipulation. A scalable security system can be set up in client/server configuration using more than one server installed with the IMZ-NS100 Series and/ or using the NSR-1000 Series Video Network Surveillance Server from Sony (which is perfectly compatible with the IMZ-NS100 Series).This system can be controlled by a common user management interface, which allows the administrator to freely set up the access level of each user. With the IMZ-NS100 Series, you can start an HD-ready video network surveillance system in the scale and configuration that's ideal for current conditions, and expand this system in the future.Sharpen your focus on security through the unrivalled image quality, design and extensive versatility of the Sony Professional security camera range. Don't miss this chance to take your video security forward with Sony Professional. Be there and be secure.

Add to Compare
AD Network Video introduces enhanced high definition IP video surveillance solution
AD Network Video introduces enhanced high definition IP video surveillance solution

Security surveillance specialist, AD Network Video, has introduced its enhanced integrated HD IP video solution. The new system, Virtual NVR, delivers a solution that combines unlimited scalability with three tiers of distributed storage, offering complete security and resilience for users. Jamie Horastead, business development manager for Virtual NVR from AD Network Video comments: “We believe Virtual NVR is ideal for a range of industries such as airports, banks and retail that demand complete reassurance that footage is secure and is fit for evidential purposes.” The Virtual NVR solution intelligently distributes video storage across single or multiple locations, with IP cameras recording and storing images on the in-camera server. These will carry on recording if network outages occur as the devices operate like standalone systems, resulting in no single point of failure. The evidential recordings are easily accessible locally or from control rooms via a single user interface and are exported in compliance with police and home office guidelines. Recordings can be archived and managed from a central location driving greater efficiency and flexibility in locating and retrieving video from multiple sites. Horastead: “Virtual NVR can offer significant returns on investment. The system combines effective video transmission, alarm handling, database integration and HD storage mitigation. “For sectors such as retail it can make an immediate difference to the bottom line, combining processing systems with Virtual NVR to reduce shrinkage owing to theft and internal fraud.” Pauline Norstrom, chief operating officer of AD Network Video, part of AD Group, comments: “Virtual NVR illustrates the continuing commitment to bringing to market uniquely beneficial and effective video security management solutions. “Our in-house R & D capability continues to underpin our industry reputation for innovation. “In a vastly undifferentiated IP video market where price and not value can be attractive to buyers, AD wins out over and above the "glorified web cam" by combining effective video transmission, alarm handling, database integration and HD storage mitigation in a way that no competitor can match. We have something special here that will help clients to improve security, increase ROI and reduce cost of ownership.” AD Group has developed security surveillance solutions for more than 30 years. The latest generation includes solutions for reducing fire risk through the use of Video Smoke Detection, FireVu, and logistics losses, TransVu. Both can be used effectively in a range of industries.

Add to Compare

CCTV software - Expert commentary

Six reasons security integrators should adopt cloud technology today
Six reasons security integrators should adopt cloud technology today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now.Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High gross profit margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier to provide managed services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely.  The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running. Cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively fix problems before they occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased valuation of business Companies that utilise cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.

Integrated security systems for medium and large-sized offices
Integrated security systems for medium and large-sized offices

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.

Five best practices for protecting video surveillance systems against cyber threats
Five best practices for protecting video surveillance systems against cyber threats

There’s no denying that cyber-crime is one of the biggest threats facing any organisation with the devastating results they can cause painfully explicit. Highly publicised cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organisations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organisation a fine of up to four per cent of global revenue or up to 20 million euros. Cyber-crime potentially affects every connected network device. In the biggest cyber-crime to date, hackers stole $1 billion from banks around the world, by gaining access to security systems. It’s more important than ever for organisations to be vigilant when it comes to their cyber security strategy. To help avoid becoming the next victim, I’ve put together a five-point cyber plan to protect your video surveillance system. 1. Elimination of default passwords A small change to a memorable, complex password could have huge consequences for your business It is estimated that over 73,000 security cameras are available to view online right now due to default passwords. ‘Password’ and ‘123456’ are among the top five most popular passwords with a staggering 9,000,000 login details matching this description. Guessable passwords create an unsecure security system which can result in an easy way for hackers to gain access to your organisation’s data, making you vulnerable to a breach. A small change to a memorable, complex password could have huge consequences for your business. Removing default passwords from products and software forces individuals to think of their own to keep their data safe. If a password system is not provided by your organisation we recommend that your password uses two or more types of characters (letters, numbers, symbols) and it is changed periodically. 2. Encrypted firmware Encrypting firmware is an important part of any organisations overall security system. Firmware can leave an open door, allowing hackers to access your data. All firmware should be encrypted to reduce the possibilities of it being downloaded from the manufacturers website and deconstructed. If the firmware posted is not encrypted, there is a risk of it being analysed by persons with malicious intent, vulnerabilities being detected, and attacks being made. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis There have been cases where a device is attacked by firmware vulnerabilities even if there are no problems with the user's settings, rendering it inoperable, and DDoS attacks being made on other servers via the device. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis. There is also a possibility of being attracted to spoofing sites by targeted attack email and firmware being updated with a version that includes a virus, so firmware must always be downloaded from the vendor's page. It may also be advantageous to combine this with an imbedded Linux operating system which removes all unused features of the device, it can help to reduce the chances of malicious entities searching for backdoor entities and inserting codes. 3. Removing vulnerabilities within the operating systems Vulnerability is the name given for a functional behaviour of a product or online service that violates an implicit or explicit security policy. Vulnerabilities can occur for a number of reasons for example, due to an omission in logic, coding errors or a process failure. Network attacks exploit vulnerabilities in software coding that maybe unknown to you and the equipment provider. The vulnerability can be exploited by hackers before the vendor becomes aware. You should seek to minimise these issues by looking for a secure operating system which is regularly updated. Panasonic has developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping As a provider of security solutions, Panasonic is taking a number of steps to ensure its consumers remain safe and secure. We have developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping. We have combined with a leading provider of highly reliable certificates and technology for detecting and analysing cyber-attacks with its own in-house embedded cryptography technology, to provide a highly secure and robust protection layer for its embedded surveillance products. 4. Avoiding remote login using Telnet or FTP Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures. File transfer protocol or transfer through cloud-based services means the files and passwords are not encrypted and can therefore be easily intercepted by hackers. An encrypted software removes the risk of files being sent to the wrong person or forwarded on without your knowledge. Telnet predates FTP and as a result is even less secure. Hyper Transfer Protocol Secure is a protocol to make secure communications by HTTP, and it makes HTTP communications on secure connections provided by SSL/TLS protocols. The major benefits of using this system is that HTTPS and VPN encrypt the communications path, so data after communications is decrypted and recorded. If recorded data is leaked, it will be in a state where it can be viewed. With data encryption, however, it remains secure and can even be recoded to storage. Thus, even if the hard drive or SD card is stolen or data on the cloud is leaked, data cannot be viewed. 5. Use of digital certificates Private and public keys are generated at manufacture in the factory and certificates installed at the factoryDigital certificates are intended to safely store the public key and the owner information of the private key it is paired with. It provides assurance that the accredited data from a third party is true and that the data is not falsified. It is beneficial for all data to be encrypted with digital certificates. Digital certificates are far safer when issued by a third party rather than creating a self-signed version unless you are 100 percent sure of the receiver identity. From April 2016, some models of Panasonic series iPro cameras come with preinstalled certificates to reduce the risk of interception and the hassle of having to create one. With i-PRO cameras with Secure function, private and public keys are generated at manufacture in the factory and certificates installed at the factory. As there is no way to obtain the private key from the camera externally, there is no risk of the private key being leaked. Also, certificates are signed by a trusted third party, and the private key used for signing is managed strictly by the authority. In addition, encryption has been cleverly implemented to reduce the usual overhead on the IP stream from 20% to 2%.