Omnicast 4.7, the latest version of Genetec’s IP video surveillance system
Omnicast 4.7, the latest version of Genetec’s IP video surveillance system

Omnicast 4.7 – IP Video Surveillance System Omnicast is the IP video surveillance system of the Security Center, Genetec’s unified security platform. It is the perfect solution for organizations requiring seamless management of digital video, audio and data across any IP network. The release of the latest version Omnicast 4.7 provides an array of new features and enhancements to the system. New Features & Enhancements  Video Trickling: Video trickling leverages the recording capabilities of the edge devices (IP cameras and encoders) by providing the ability to choose and transfer the video from the edge on demand and store it in Omnicast for long-term archiving. This new feature allows for increased recording reliability, bandwidth usage optimization by only transferring video of interest at the right time, and the opportunity to lower costs of remote-site recording by going serverless. HTTPS support: HTTPS support increases security of the edge device communications by encrypting the commands and controls of the cameras. The support for HTTPS is available with all Axis cameras and encoders, fifth generation Sony cameras, and the Genetec extension when supported by the partner. Simplified unit enrolment process: It is now possible to search and enroll cameras by manufacturer name and add units to the system based on a specific IP address range so that multiple units can be added simultaneously, saving considerable time during setup. Support for Axis cameras’ Cross Line Detection feature: Customers can now monitor and handle cross line alarms within Omnicast, and search for cross line alarms directly from the Archive Player. Additional languages: In order to enhance the user experience, Arabic, Persian, Thai and Russian languages have been added to Omnicast 4.7. The user interface has also been adjusted to read from right to left in both Arabic and Persian.

Add to Compare
Hikvision Smart IP Solution 2.0
Hikvision Smart IP Solution 2.0

This amazing and intelligent solution has enriched Smart features, and consists of many innovative, industry-leading IP products. The Smart Solution 2.0 solution is also the ideal choice for various vertical applications.  Enriched smart features Smart IP Solution 2.0 includes Smart features such as object counting, region entering, region leaving, object removing, object leaving, target cropping stream and ANPR (customisation required). Industry-leading IP products New Hikvision IP cameras have been incorporated into this solution, including the DarkFighter series, LightFighter series, 6MP Ultra HD series, 4K series, and new 3MP WDR series, with industry-leading product performance. Versatile solutions Smart IPC and Smart NVRs with Smart features are the perfect solution for small and mid-sized applications. For mid-sized to large-sized applications, iVMS-5200 Professional software further improves the system's effectiveness with Smart features and analytics. Tailored to vertical applications As an all-in-one Smart platform to manage cameras, NVRs, alarms, access control and decoders, the Smart Solution 2.0 is loaded, with Smart features and analytics such as people counting, heating mapping, LPR, and more. This makes it highly adaptable to verticals’ special requirements and can be used in retail, banking, hotel and industrial applications, among others. Enriched smart features Target cropping stream - The third stream of video can be sent to a different source for recording or display in a pre-defined resolution, thus providing more details of a targeted area if needed. Object counting - You can designate an area of interest and let the camera count objects entering or leaving, which include not only humans but also vehicles. It also offers statistical reports. Region enter / exit - This function detects people, vehicles or other objects that enter or exit from a pre-defined virtual region, triggering an alarm. Object left behind / object removed- This function detects objects left or removed from a pre-defined region, the alarm is triggered. ANPR - On-board ANPR analytics allow the ability to detect and recognise a vehicle’s license plate and send ANPR info to a Smart NVR or iVMS-5200P for access management. Supports may vary based on local LPR algorithm development and customisation process required. How does it work? Smart Search: quick retrieval of the camera’s Smart content, such as ANPR or facial recognition. Smart Playback: playback important events in normal speed, otherwise footage will play in 16x quick view. Smart Backup: only store event-based video to maximise storage. Highlighted technology 1. Smart Codec H.264+ optimised compression: An efficient way to benefit manage super high resolution video footage  Analytic + Compression: The moving target is extracted from the static background, using a different codec for each element.  Hikvision H.264+ Smart Codec: In a static night time environment, the bitrate of H.264+ can reach up to 50~60Kbps, 10~20x over standard H.264 codec, that not only saves bandwidth resources, but efficiently decreases storage requirements. 2. ANPR module - The perfect solution for your entrance management.  3. People counting module - Boosts productivity as well as security.

Add to Compare
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012

At the ASIS trade show and conference, Genetec, a pioneer in the physical security industry and a leading provider of world-class unified IP security solutions, showcased the latest advances in its unified security platform, Security Center, which blends license plate recognition (LPR), video surveillance and access control into one easy-to-use platform. Show attendees had the opportunity to climb aboard Genetec's AutoVu Demonstration Vehicle to experience the state-of-the-art in mobile license plate recognition technology, while driving around the streets of Philadelphia.  The newest version of Security Center introduces a host of new features designed to further enhance security events and video monitoring, simplify the system's operation, streamline upgrades and maintenance activities, and help users easily monitor the health of their entire security platform. Also featured in Security Center is Plan Manager, an advanced map-based interface that allows users to create a virtual environment from maps, floor plans, or GIS (geographic information system) maps for all types of sites including cities, neighbourhoods, airports, campuses, industrial sites, and buildings. With Plan Manager, each video surveillance entity (cameras, sensors, doors, alarms, etc.) is represented on the map by an icon. Operators can simply click on these icons to trigger actions such as 'show a camera', 'lock a door', 'execute a macro', 'turn off an alarm', etc. Security Center also features the latest in mobile applications allowing organisations to equip their security personnel with an Apple® iPod touch®, iPhone®, iPad®, RIM BlackBerry® or Android™ Smartphones so that they can monitor and control their security operations over any wireless network, while on the move. At this year’s ASIS, Genetec will demonstrate video playback on smartphones, as well as streaming video from smartphones back to the Security Center for live viewing and recording. Security Center Mobile also features the industry's first platform-independent, universal web client for video, access control, and license plate recognition. The unified web client allows customers to connect back to their platform to view live video streams, control PTZ cameras, configure aspects of their access control and LPR systems, and run reports from most web browsers including Microsoft Internet Explorer®, Mozilla Firefox®, Google Chrome®, and Apple Safari®. Show attendees who were interested in experiencing the latest advances in mobile License Plate Recognition technology were able to sign up to drive around the streets of Philadelphia in the Genetec Demonstration Vehicle, a fully equipped Dodge Charger featuring AutoVu, Genetec's innovative LPR system. AutoVu automatically collects vehicle license plates and alerts the user of issues or infractions and offers a perfect solution for wanted vehicle identification, mobile license plate inventory, or for permit and/or time-limit parking enforcement. Inside the car, on a ruggedized laptop installed for driver use,  was the AutoVu Patroller, a highly mobile, easy to use software designed to automate the verification of vehicle license plates. On the car's body there were several AutoVu SharpX IP-based LPR cameras. Specifically designed for mobile applications, the SharpX IP on-vehicle camera is one of the smallest high-resolution LPR cameras in the world. It provides images with two to three times higher resolution than most other LPR cameras on the market and results in extremely accurate license plate read rates – even in bad weather, at poor angles, and at high speeds.  The trunk of the car housed the AutoVu LPR Processing Unit and Security Center which provided the back-office management capabilities of the system so that in-vehicle users are able to download all the latest hotlists and updates. The in-vehicle patroller application allows users to review all data collected throughout the day while the Security Center operator can monitor reads from all vehicles in the back-end. Wirelessly, or at the end of a shift, all data collected can be synchronized with the organization's central Security Center system for ongoing analysis.

Add to Compare
Milestone Systems XProtect® Expert – Powerful control for advanced surveillance
Milestone Systems XProtect® Expert – Powerful control for advanced surveillance

Milestone XProtect® Expert is advanced open platform IP video management software (VMS) for medium and large installations. Its powerful central management interface allows large systems with multiple Recording Servers to be efficiently managed as one uniform system. Using scheduled and event-driven rules, it is easy to automate security actions and control external systems, reducing the amount of manual tasks. Ideal for daily users and operators who want sophisticated live monitoring, XProtect Expert features efficient alarm handling, multi-layered and interactive maps, and the ability to flag suspicious incidents for later review. Reduce total cost of ownership Central management: Centrally manage all aspects of the surveillance system, such as connected cameras, devices, storage and users from a single client interface Powerful management interface: A wide range of administration tools help ease the initial configuration and daily administration of large systems that are deployed across different geographical locations System Monitor: Gives instant feedback on system performance and enables proactive administration of the system Configuration reports: System integrators can document system delivery and provide a detailed listing of all configuration settings High-performance video recording 64-bit Recording Server: Users can run more cameras on fewer servers helping to save money on total system costs Unlimited system scalability: Full flexibility to add additional Recording Servers and expand the system Edge Storage with flexible retrieval: A redundancy option that ensures continuous recording of audio and video and allows users to control when recordings are retrieved from camera storage based on time schedules and events Versatile rule engine: Easily automate different aspects of the system, such as lights and doors, based on security events or time schedules, eliminating the need for manual control Real-time situational overview Alarm Manager: Single-point alarm function that provides a clear and consolidated overview of security and system-related alarms and gives instant access to cameras for immediate visual verification, decreasing the number of false alarms Bookmarking: Flag video sequences of particular interest and add descriptive notes, enabling users to easily share information and increase efficiency in investigating incidents Interactive maps: Gain a comprehensive overview of camera locations and layouts of an entire surveillance installation, allowing for quick detection of trouble areas

Add to Compare
Dallmeier releases new tutorial videos on viewing software Smavia Viewing Client
Dallmeier releases new tutorial videos on viewing software Smavia Viewing Client

Dallmeier has expanded its portfolio of online tutorials on its YouTube channel and introduced new videos on the viewing software Smavia Viewing Client.  Smavia Viewing Client is a powerful and intuitive software for the convenient evaluation of live and recorded image material via Ethernet. In new “How-To” videos Dallmeier shows how easy it is to use the software and what useful features it offers.  "Live View" This video focuses on live viewing of video material. In the Smavia Viewing Client the cameras are represented in a clear camera tree structure, from which they can easily be moved by Drag&Drop into various split windows. A special highlight are the “flexible split windows”: In addition to predefined split views every user can adapt the software specifically to his or her requirements and define and design split windows individually. A corridor mode can also be set up very easily, since there are no fixed default image layouts such as 16:9 or 4:3. If several monitors are being used it is also possible to start the Smavia Viewing Client in multiple instances. In addition, many other useful features are available to the operator, such as the integration of site maps, an easy-to-use zoom function or pixelisation of moving objects.  "Search and Backup" This video deals with the subject of search and backup. Here Dallmeier introduces the various search functions of the Smavia Viewing Client and explains step-by-step how to efficiently evaluate recorded image material. In addition to a simple search by date and time, other available options include a fast search with user-defined time units and step lengths, an index search for incidents and an extended search for data from external devices such as scanners of cash registers or ATMs. The most efficient evaluation is offered by a search using Dallmeier SmartFinder, a system for intelligent searches for movement within freely definable image areas. Dallmeier uses an example to clearly explain how SmartFinder works. There are also demonstrations of how to create backups of relevant sequences.  Want to learn more? The "Search and Backup" tutorial and other videos can be found online on the Dallmeier YouTube channel.   The Smavia Viewing Client is available for downloading free of charge on the Dallmeier homepage.

Add to Compare
AD Network Video introduces enhanced high definition IP video surveillance solution
AD Network Video introduces enhanced high definition IP video surveillance solution

Security surveillance specialist, AD Network Video, has introduced its enhanced integrated HD IP video solution. The new system, Virtual NVR, delivers a solution that combines unlimited scalability with three tiers of distributed storage, offering complete security and resilience for users. Jamie Horastead, business development manager for Virtual NVR from AD Network Video comments: “We believe Virtual NVR is ideal for a range of industries such as airports, banks and retail that demand complete reassurance that footage is secure and is fit for evidential purposes.” The Virtual NVR solution intelligently distributes video storage across single or multiple locations, with IP cameras recording and storing images on the in-camera server. These will carry on recording if network outages occur as the devices operate like standalone systems, resulting in no single point of failure. The evidential recordings are easily accessible locally or from control rooms via a single user interface and are exported in compliance with police and home office guidelines. Recordings can be archived and managed from a central location driving greater efficiency and flexibility in locating and retrieving video from multiple sites. Horastead: “Virtual NVR can offer significant returns on investment. The system combines effective video transmission, alarm handling, database integration and HD storage mitigation. “For sectors such as retail it can make an immediate difference to the bottom line, combining processing systems with Virtual NVR to reduce shrinkage owing to theft and internal fraud.” Pauline Norstrom, chief operating officer of AD Network Video, part of AD Group, comments: “Virtual NVR illustrates the continuing commitment to bringing to market uniquely beneficial and effective video security management solutions. “Our in-house R & D capability continues to underpin our industry reputation for innovation. “In a vastly undifferentiated IP video market where price and not value can be attractive to buyers, AD wins out over and above the "glorified web cam" by combining effective video transmission, alarm handling, database integration and HD storage mitigation in a way that no competitor can match. We have something special here that will help clients to improve security, increase ROI and reduce cost of ownership.” AD Group has developed security surveillance solutions for more than 30 years. The latest generation includes solutions for reducing fire risk through the use of Video Smoke Detection, FireVu, and logistics losses, TransVu. Both can be used effectively in a range of industries.

Add to Compare
Sony IMZ-NS132M intelligent monitoring software for 32 cameras
Sony IMZ-NS132M intelligent monitoring software for 32 cameras

RealShot Manager Advanced Series is the latest version of Sony’s industry-leading management software - and it takes IP monitoring to a new level. A combination of real-time image processing, automated functions and intelligent video analysis helps detect security threats automatically and reliably. This removes the burden from your surveillance staff - so they no longer have to monitor camera feeds by eye, and they no longer have to search through hours of archived video to find incidents. The latest release builds on the functionality of previous RealShot Manager versions to make it the most advanced monitoring solution available today. Features include: HD-ready - allowing you to migrate to megapixel cameras at your own pace Simple to set up and operate - thanks to easy-to-use wizards and automatic camera detection Open platform - for compatibility with all major camera brands Scalable - from 1-32 camera control, to meet your changing needs Intelligent features including: Intelligent Object Detection and Intelligent Motion Detection, which can trigger alarms, locks and lights automatically Active Intelligence, which highlights suspicious activity on-screen to reduce false alarms Hot-spot monitoring Intuitive drag-and-drop interface RealShot Manager is the perfect tool for managing your current and future IP camera investments. For real quality network security in real time, there’s nothing more advanced.

Add to Compare
RealShot Manager Advance from Sony
RealShot Manager Advance from Sony

GO ADVANCEDThe demand for surveillance systems is growing, and the adoption of IP as a transport mechanism for video is ever increasing. Sony recognised this trend early on, and has been focused on developing products and solutions aligned with it.Now Sony is pleased to announce the introduction of the IMZ-NS100 Series Intelligent Monitoring Software, which can be installed on your own Microsoft ® Windows ® server to monitor and control 1, 4, 9, 16 or 32 network cameras (IMZ-NS101, IMZ-NS104, IMZ-NS109, IMZ-NS116, and IMZ-NS132, respectively).The IMZ-NS100 Series is easy to use and free from complicated operation - users find it simple to set up connected cameras and to set frame rates for recording. They can also easily monitor, search, and play back events with intuitive manipulation. A scalable security system can be set up in client/server configuration using more than one server installed with the IMZ-NS100 Series and/ or using the NSR-1000 Series Video Network Surveillance Server from Sony (which is perfectly compatible with the IMZ-NS100 Series).This system can be controlled by a common user management interface, which allows the administrator to freely set up the access level of each user. With the IMZ-NS100 Series, you can start an HD-ready video network surveillance system in the scale and configuration that's ideal for current conditions, and expand this system in the future.Sharpen your focus on security through the unrivalled image quality, design and extensive versatility of the Sony Professional security camera range. Don't miss this chance to take your video security forward with Sony Professional. Be there and be secure.

Add to Compare
Panasonic’s new WV-ASM970 & WV-ASC970 software provides an all-inclusive, hybrid security solution
Panasonic’s new WV-ASM970 & WV-ASC970 software provides an all-inclusive, hybrid security solution

The increasing trend in switching from analogue to IP security solutions has inspired Panasonic System Networks Europe to develop and present the new WV-ASC970 IP matrix server software and the WV-ASM970 IP control software to allow flexible, all-inclusive and hybrid security solutions. WV-ASC970 IP matrix client software The WV-ASC970 software allows a server PC to integrate multiple network components into one easy-to-manage flow of data. Allowing up to 64 recorders, 64 decoders and 2048 analogue and IP cameras to be registered, security professionals have available a huge amount of information from the monitoring terminal. Panasonic's WV-ASC970 software is designed to ensure total cost of ownership is minimised by extending the life of Panasonic analogue cameras alongside new IP technology - convergence rather than replacement. Hosting hybrid solution such as these smoothes the transition process between analogue and IP as well as making varying network peripherals available from the user interface, including WV-ASC970 software. The WV-ASC970 allows both camera viewing and camera control for up to 512 individual user registrations with 64 simultaneous users supported at once, enabling collective security and remote monitoring. WV-ASM970 IP control software The WV-ASM970 client software is installed to each client PC, which enhances operation and monitoring of the full security network. Multi-monitor function enables simultaneous use of the Operation Screen and Monitoring Screen for comprehensive supervision. Other viewing options allow up to 30 IP cameras to be displayed in a 16 split screen format in MPEG-4, 2mbps mode whilst providing full location information and maintaining optimised network usage. In addition Automated Status Change uses the monitor to display a location map when an alarm is triggered to ensure security professionals can locate and action emergency response.  In summary WV-ASC970 IP matrix server software and the WV-ASM970 IP matrix client control software are designed to smooth the transition from Analogue to IP, enhance system scalability plus extend the life of existing systems.  This makes specifying Panasonic the best choice to reduce costs and improve protection of personnel and property.

Add to Compare
Adjusting to any surveillance application
Adjusting to any surveillance application

DIVA, an IP-based video management solution, adds intelligence and comfort to video surveillance and monitoring. Next to the full-featured live-viewing and playback user-interface, DIVA offers built-in intelligence for facial recognition and license plate recognition for security applications. In combination with Siqura’s IP cameras and codecs, DIVA offers the perfect solution for a wide range of situations, including perimeter security, homeland security, theft/vandalism prevention, and intrusion detection. Adapting to the application DIVA is one of the most flexible VMS solutions available. Whether it’s a small operation of ten streams or a complex network of well over 1000 cameras, DIVA successfully manages the network and applies analytics algorithms to detect and recognize faces and license plates. Since operators often require different features and functionalities, it is possible to configure the DIVA user-interface and video wall layout to fit the needs of each specific user profile. This ensures that those using DIVA have an accessible and user-friendly application at their finger-tips. Easy integration It is easy to integrate DIVA with third-party systems. Besides supporting a wide range of subsystems, including access control, data synchronization, intrusion, and building management, DIVA provides flexible XML data output to communicate its events to third-party applications. Furthermore, DIVA can integrate with a matrix switch to provide a hybrid solution. This ultimately facilitates the migration from existing analog infrastructure to an IP installation. Guaranteed availability DIVA’s failover server ensures the reliability and availability of the entire system It monitors a specified list of servers. If no response is received from one of the servers, the failover server takes on the settings of that server and starts to function as that server. Several failover servers can be defined to monitor different groups of active servers. Additionally, DIVA monitors the position and image quality of connected cameras to verify the effectiveness of the applied analytics. This ultimately provides users with a truly complete management system that guarantees the dependability of the surveillance solution.

Add to Compare
Security Center 5.0 – Genetec’s unified security platform
Security Center 5.0 – Genetec’s unified security platform

The Security Center is a unified security platform that seamlessly blends Genetec's IP license plate recognition, video surveillance and access control systems, AutoVu, Omnicast and Synergis, within a single innovative solution. Consolidate real-time monitoring, alarm management, reporting, and playback of events across all your security systems, from one interface.Here are some of the latest features of version 5.0:• Unified configuration: A single client application can now be used to efficiently configure your video, LPR, and access control systems, streamlining the whole configuration process for system administrators. • Next-generation video engine: Security Center 5.0 video performance enhancements include rendering of more cameras per workstation, an enhanced streaming engine that optimizes routes video and audio will take throughout your network, and better video fluidity over wide area networks (WANs). • Local video caching and buffering, all-frame video playback: This new function of Security Center 5.0 buffers video locally on the client workstation, reducing the amount of retransmission that is typically required for video thereby minimising bandwidth usage, as well as providing users faster access to recorded video. • Intrusion integration: Security Center 5.0 now supports the integration with third-party intrusion panels and perimeter detection systems. Users can now run reports on intrusion panel events, view video tied to intrusion events, and arm/disarm intrusion devices either through automated scheduled tasks or manually via the user interface. • Enhanced integration toolkits: The Security Center Software Development Kit (SDK) has been augmented with embedded video functionality, now providing developers with a single SDK for access control, video, and LPR. Additionally, Genetec has added a number of new toolkits to its existing portfolio, namely a web service SDK for development geared towards additional operating environments and an intrusion driver development kit (DDK) to facilitate the integration of third-party intrusion panels.Interested in obtaining more information on our products and solutions, check out our website at genetec.com or visit us at ASIS, booth 846. 

Add to Compare
Security Center: Unified security platform
Security Center: Unified security platform

The Security Center is a unified security platform that seamlessly blends Genetec’s IP video surveillance, access control and license plate recognition systems within a single innovative solution.Some Benefits of the Security Center:Unify your operationsOffers customers a truly unified approach to managing their security and public safety operations. True unification means that every aspect of your security operations is consolidated under a single platform, from real-time monitoring to alarm management, reporting, and playback of events. Though flexible enough to run as either an access-only, LPR-only or video-only interface, the Security Center truly comes to life in multi-application environments.Simplify your workflowsThe basic operating principle behind the Security Desk is to simplify the operator’s job. Through innovative concepts such as operator-initiated tasks, a dynamically adaptive interface, and context-sensitive widgets, operators are given the right functionality to perform their duties at the right time, while removing unnecessary items that typically clutter an interface.Empower your operatorsOperators can intuitively generate reports, monitor remote and local cameras, and track cardholders and assets with the single click of a mouse button on a workstation, from a touch screen, or even a mobile device. Given that the interface is adapted to only the tasks that are pertinent to each operator, users quickly become familiar with the system’s functionalities through self-learning, thus allowing for increased autonomy and confidence within your team. Download the Genetec Security Center brochure

Add to Compare
Optimise operations of surveillance system components with Milestone XProtect Central 3.7
Optimise operations of surveillance system components with Milestone XProtect Central 3.7

Milestone Systems, the open platform company for IP video management software, has released XProtect™ Central version 3.7. XProtect Central is an operational status monitoring and alarm management solution for Milestone XProtect Corporate, XProtect Enterprise & XProtect Professional servers, video surveillance cameras and external devices. This solution ensures that operators maintain a complete overview of alarms and technical problems, allowing immediate visual verification and troubleshooting to resolve incidents fast.Ideal for implementations with multiple sites or buildings, XProtect Central helps large security installations minimize risks and optimize operations. The visual and audio alerts can improve busy environments like alarm and dispatch centrals, where the instant access to servers and cameras translates to quick response for all locations. Using clickable graphical overviews and customizable alarms with visual verification on the status of all connections and hardware, response control is at its best.Visually verify alarms, respond fast, audit trailsInstallations with different servers, cameras and hardware must run properly to ensure top security if a device fails to record or display video, the outcome can be devastating. Milestone XProtect Central is a powerful tool for managing such operational demands to ensure maximum up-time, total overview, and fast reactions. It continuously monitors the operational status and event-triggered alarms of XProtect servers, video cameras, and integrated devices such as access control units. Security operators get instant graphical overviews of alarms and technical alerts with immediate visual verification to resolve issues.An alarm list displays a filtered overview of all problems for clicking directly to an incident and a beep feature can help ensure attention.Users can define alarm priorities, pre-define time profiles, acknowledge or reassign alarms, enable and disable alarms with controlled user commands or by hardware input signals: for example, enable a motion detected alarm when the last person leaves a building.Alarms triggered by an input signal have a preview image from the camera, and can be used for cameras watching each other: if one fails, the other lets you know what happened.Spread the workload: provide backup capacity by assigning alarm management to multiple simultaneous operators with individual rights.Create audit trails of events.Easy graphical map overviewsMulti-level maps make easy navigation and identification of incident locations and the system elements involved. Alarms are shown at the highest level map, like a city site, and operators can click down to sub-level maps of buildings, rooms, gates, etc. for more details or actions.New in XProtect Central 3.7Define default image quality and frame rates by alarm type, which can also be altered manually by operators when playing back an alarm or viewing a live stream. This capability reduces the system bandwidth usage and allows remote users connected via low bandwidth connections to access video sequences associated with the alarms in XProtect Central - particularly relevant when monitoring a number of distributed systems where the connections between systems are low or not guaranteed.Auxiliary commands enable control of such things as wipers on cameras connected via video servers. Such camera-associated devices that are connected via auxiliary connection can be controlled from the central client.Additional support for Windows 7 and Windows Server 2008 R2 is now provided.Integration with third-party systemsXProtect Central has plug-in support for third-party systems like access control or other devices. Operators can both monitor and control these from the XProtect Central interface (close or open gates, doors, turn off smoke detectors, etc.), in addition to monitoring and verifying their status and alarms."Milestone continuously enhances our software to increase performance for our customers. This ensures the best return on their security system investment, the ability to easily include new innovations as they become available, and most importantly constantly improves security," says Christian Bohn, Head of Product Management at Milestone Systems. "Using XProtect Central, operators can concentrate their time on actual events and not just stare ineffectively at a monitor wall. It's more than just alarm and operations management - it's trouble-shooting that minimizes risk significantly."Milestone will be exhibiting the full line of XProtect IP video management software at IFSEC in Birmingham UK May 10-13 (Hall 4, F90).

Add to Compare
Milestone offers XProtect Go: IP VMS for free!
Milestone offers XProtect Go: IP VMS for free!

Milestone Systems, the global leader for open platform IP Video Management Software (VMS), offers XProtect™ Go free video surveillance software. With a wide set of features for one user to manage and view up to 8 cameras, XProtect Go is easy to learn and use - the perfect start-up product for small business and residential customers who want to secure their property with the advantages of top quality IP video surveillance. XProtect Go is available for free as a download from the Milestone Systems website.IP network video surveillance continues to gain ground as the technology of choice over analogue security products, and to help accelerate this trend Milestone Systems has launched XProtect Go as a free version of the company's world-leading XProtect IP video management software. XProtect Go has a wide set of fully functional features to let people discover the benefits of the Milestone open platform: it is flexible, scalable and future-proof. Designed for high-tech residences and small businesses, XProtect Go provides the opportunity for new customers to explore the leading IP video management software platform at no cost, with seamless upgrade possibilities to Milestone's premium products. "As a free version of our software, XProtect Go lets new customers check out our world-leading IP video management platform with no initial investment and an easy upgrade path to fuller versions of our products, including integrations with other security products," states Christian Bohn, Head of Product Management at Milestone Systems. "This initiative will reach a wider audience for IP video, strengthen Milestone brand awareness and drive new business for our international eco-system of authorised partners."Delivered with a Management Application in several languages, XProtect Go is easy to learn and easy to use, starting with an initial default view that can be customised. One user can manage up to eight network cameras, 4 USB/web cameras or analogue cameras connected via encoders. Live or recorded video can be viewed with archiving up to five days, and evidence exporting in AVI format with a watermark or for long-term storage on DVD. The XProtect Smart Client interface has 22 language options and such high-end features as Smart Search and Sequence Explorer. Website support will include Tips & Tricks, FAQ and an interactive user forum. XProtect Go can be downloaded at no cost from the Milestone website, with user registration required after 30 days, and re-registration on a yearly basis.

Add to Compare

CCTV software - Expert commentary

4 smart ways to use security to power the business of the future
4 smart ways to use security to power the business of the future

In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule.  This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace.  Strong and smart security ecosystem While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future.  Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimise their operations, and secure their network. 1)Protect your people  Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models.  This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly. Integrating platform Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example:  With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building. Leveraging AI and machine learning Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes. When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimise congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively.  All of this is powered by a security ecosystem that can help a business better protect its people while realising other benefits in the process. 2) Safeguard your assets Businesses are concerned about the security of their assets when it comes to the hybrid workforce model Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach.  This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations.  As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely.  Remote management and visibility This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic. These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more.  Loss prevention strategy When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more. For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits. 3) Optimise your operations The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimise their operations – especially now with the challenges posed by price inflation. A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more.  Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs Cloud video surveillance systems For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition. However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilised, and an additional 20% aren’t even aware that it could be used in other ways. AI and analytics The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimise their operations, helping their business to operate more effectively and efficiently.  The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience. 4) Secure your network Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats.  Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behaviour.   Cybersecurity software For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behaviour, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach.  A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defences so that they can avoid downtime and continue to operate with peace of mind.  Prepare your business for the future Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem.  With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimising operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence. 

How new management systems are innovating the hospitality industry?
How new management systems are innovating the hospitality industry?

Technology has certainly become an intrinsic part of our day-to-day lives, from the retail industry, to food and beverage outlets, and even within the health and fitness industry. It’s all around us, in varying formats, making processes more efficient. It has refined some of our older approaches, and in the hospitality industry, this is certainly true. Technological advances are leading the way forward for the future of hotels, and with the sector now free from COVID-19 restrictions, venues are looking for ways to improve the guest experience with technology. A staggering recent statistic has suggested that 75 percent of activities in hospitality could one day become automated — so where exactly are we heading on this journey into the future of hotels? Join Cairn Collection, owner of The Stirling Highland, and explore a whole host of innovations that are changing the face of hotel management systems. The 21st-century check-in desk The breadth of technology that is slowly becoming more widely available is transforming the hospitality industry The digital age is constantly finding new ways to innovate and prove its value and worth for modern consumers, and the breadth of technology that is slowly becoming more widely available is transforming the hospitality industry. In the past, connotations of a check-in desk were long queues and excessive pieces of paper — from room service menus to a mini catalogue of highlights of the local area. Technological innovations such as face recognition are one of the major ways that this process is changing. Using artificial intelligence A handful of hotels have already trialled or introduced artificial intelligence (AI) into their daily running, and it looks set to become far more mainstream by 2025. From paying the bill by using biometrics to allowing hotel managers to handle data more efficiently, AI looks set to be welcomed with the potential for it to reduce costs by 13 percent. The entire hotel check-in process could become automated, making one of the most established parts of the hotel experience redundant — but staff could be freed up to engage with customers, allowing them to get into their rooms quicker in the meantime. Many venues have even gone fully paperless when it comes to checking in, choosing instead to upload the process to cloud computing systems where information can be stored and viewed by connected devices. Convenience is the key More hotels operate their room unlocking facilities through mobile phone-connected technology, NFC After having checked in to a hotel, guests will want to explore the room that they’ve booked. Doing so has never been easier, and the classic magstripe locks which were once the most commonly used method of accessing hotel rooms are being progressively phased out. More and more hotels now operate their room unlocking facilities through mobile phone-connected technology, near-field communication (NFC).  This technology allows for data transfer at up to 424 kb per second, and it is enabled when connected devices come into contact with each other. Mobile key systems Most mobile key systems require guests to download and activate a key through the hotel’s digital app, and upon arrival, they can use the activated key to unlock the door to their hotel room. Combined with online/digital check-in services, guests can use the e-key to check in early or at a time that suits them best, knowing that they don’t have to wait around to pick up a physical key. Small touches like this build a sense of brand familiarity for customers, as well as streamline their hotel experience, and this distinguishes them from competitors. Hotel management systems Hotel management systems need to account for the experience that guests have while staying at the venue Of course, hotel management systems also need to account for the experience that guests have while staying at the venue and technology can do a lot to enhance this. Hotels have to innovate the spaces that they are presenting to their customers and technology has become a valuable asset to help enhance customer satisfaction, as the hotel room is certainly not simply a place for rest anymore. Voice-enabled devices Voice-enabled devices are becoming common features in rooms, with popular models such as Google Assistant, Apple’s Siri, and Amazon Echo providing guests with information on the local area — if you’re looking for the perfect backdrop to the business dinner you’re attending, just ask Alexa! Hotels could even record and distribute their personalised voice messaging to help reinforce the brand presence into the technology. Technology can help you attract and retain customers by offering services above and beyond what they’d usually receive A room and then some As the generational switch to millennials and Gen Z continues, the need for an experience has grown and, through a mixture of technology, hotels can cater to these revised consumer needs. From setting up messaging platforms to providing a remote control that monitors absolutely everything in the room — from atmospheric mood lighting to music streaming services and more, a hotel room can be whatever the user wants, and the experience is therefore generated by the customer. Technology doesn’t stop advancing, and there are constantly new, refined approaches to hotel management systems that have marked a stark departure from ways of the past. With guests returning after over a year of COVID-19 restrictions, competition for their business is even tougher. Technology can help you attract and retain customers by offering services above and beyond what they’d usually receive.

Network operator fraud remains the biggest threat to the revenues of mobile operators
Network operator fraud remains the biggest threat to the revenues of mobile operators

As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.  In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.  Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.  Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”  Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”  “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”    Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.  Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”    A simple but effective fraud  Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes.  A primary risk is SIM Box fraud.  SIM Box fraud  SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal.  The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”  While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.   Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”    Is it illegal?  If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.  For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.”  “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”  Other telecommunications fraud  Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.  While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.  The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”  “The call starts as a dialled telephone call, but the user receives it within an OTT app.  If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”  Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”  According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”.  This is defaulted to “on” when the app is downloaded.  Only the most technologically savvy users would even know it was there.  Combatting the fraud against networks  Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud?  The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”  “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible.  This has led to a mindset where whatever the questions the answer is always more marketing promotions.”  A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.  An opportunity for the future  As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.” 

Related white papers

Video Surveillance as a service: Why are video management systems migrating to the Cloud?

The borderless control room

Smart and reliable rail and metro operations