Video Management Software(260)
Dahua Technology, a world-leading manufacturer of video surveillance products headquartered in Hangzhou, China, introduces home Wi-Fi solution, offering real-time monitor for home surveillance. Dahua home Wi-Fi solution allows users to monitor home or staff at work, and acts as a deterrent to thefts and other crimes. The resolution of Dahua home Wi-Fi series camera is up to 3-Megapixel and it can connect with easy4ip app for remote control and viewing. The footage saved in local storage. Users are able to communicate with family, friends or staff remotely while checking on them via the built-in bi-directional audio. Besides, the camera can send alarm notifications when it detects activity. Dahua home Wi-Fi series camera features wireless operation that saves wiring and installation time in great deal. The simple 3-step installation process enables it to detect and connect to the Wi-Fi network automatically, letting users view streamed video right away. Due to its compact design, the camera can be placed almost anywhere and provides 120 degree monitoring with more clear details. Dahua home Wi-Fi solution is ideal for home or business owners who want to stay aware of their property 24/7. It is a great tool for keeping an eye on things from afar. “Our 3-Megapixel Wi-Fi cameras with bi-directional audio ensures the owners to keep an eye of their home or business in real-time. By working together with easy4ip app, video clips can be sent to their phones or tablets when an alarm is tripped, showing them the cause of alarm and the information needed before arrival on-site.” said Peter Pan, Product Manager at Dahua. “We offer customers a perfect choice for not only smart and comprehensive security, but also added value with remote monitoring capabilities and effective management.” Recommended models: C 15/35 K15/35 A15/35 HFW1120/1320S-W HDBW1120/1320E-W SD22204T-GN-W SD29204T-GN-W Product highlights: Capture every detail with 3MP camera 7*24 real-time monitoring & playback Bi-directional audio Push alarm (motion detection & sound detection) Plug & Play with Easy4ip APP Easy to installAdd to Compare
Latitude NVMS is the platform of choice for corporations and organisations that want to manage video surveillance operations over IP networks in the most effective way. DVTEL’s award winning Latitude NVMS® is an open standards, network-based video management software platform that is designed to be both powerful and versatile. Using the latest technology advancements of an enterprise system, Latitude is part of DVTEL’s cutting-edge Video Security Solution for organisations of all sizes. Latitude replaces antiquated CCTV matrix switches, multiplexers, or DVRs to provide the power of a cutting-edge IP-based physical security solution. From a small business, single server system to a distributed system managing thousands of cameras, Latitude can efficiently support any system size or architecture. Plus, installations can span multiple sites, cities and continents. Latitude NVMS is part of DVTEL’s total Video Security Solution. DVTEL develops, designs, and provides solutions that protect critical infrastructure -- in transportation hubs, city centres, nuclear and power facilities along with buildings and campuses of corporations, educational institutions and government facilities. DVTEL’s Video Security Solutions tie together the most advanced Network Video Management Software with leading edge IP-based cameras and encoders, including built-in analytics capabilities that detect and report security threats, creating a powerful security “edge”. Features of Latitude version 6.3 include remote and central monitoring; failover and redundancy; advanced alarm management; audio handling; SceneTracker™, which stitches multiple scenes together into a panoramic image; and TruWitness™, which enables a smartphone to be used as an IP camera. Now, certain advanced features, such as ActiveDirectory, CaseBuilder and SNMP, are included free of charge, and the prices of some of the existing features have been reduced.Add to Compare
Hikvision iVMS-5200 Professional software can be easily customized to suit the complete business needs of different vertical markets. For example, iVMS-5200 Professional includes a Transact module and a Business Intelligence module in, to better meet the demands of the retail sectors and Hikvision is integrating a License Plate Recognition module for transportation and parking systems and an Access Control module for building facilities management. Many more modules are planned and will be introduced in the future. The retail sector also benefits from a fully-integrated POS system, which enables users to combine video and transaction data to assist loss prevention and provide evidence in case of customer disputes. Retailers, and supermarkets and chain stores in particular, can also take advantage of the advanced video analytics, such as face recognition, people counting and heat maps to monitor customer flow and preferences and employee performance. iVMS-5200 Professional generates a host of graphical reports to capture this valuable business intelligence and improve management efficiency. Smart iVMS-5200 Professional fully supports smart features from Hikvision products, including smart search, playback, smart detection, and smart application for people counting, heat map, interactive map and much more. It delivers a total Smart Solution and enhances management efficiency, allowing users to easily find a specific video clip or locate a suspicious target, etc. Open Besides integration with all types of leading CCTV equipment, iVMS-5200 Professional also easily interconnects with various types of security and business systems due to its open architecture design. This complete flexibility provides customers with greater operational possibilities and almost limitless adaptations. More importantly, the iVMS-5200 software allows operators to fully customize their own security system specifically tailored to meet each project’s individual needs. Besides the comprehensive benefits that Hikvision iVMS-5200 Professional brings through being Open, Smart and Complete, users can also enjoy the easy-to-use functions in which it excels. iVMS-5200 Professional video management software ensures a simple and optimised experience for partners and end users, such as supporting One Step Installation. With just a few clicks, users are able to easily install the software and avoid time-consuming tasks, such as additional staff training. With efficient modular design, iVMS-5200 Professional is also capable of resolving potential system failure quickly by automatic detection and recovery. This ability enables shorter maintenance times and protects users’ investment. “I am very excited about this release and the possibilities it gives our customers. Whether it’s a new site installation or expanding an existing system, the iVMS-5200 professional software delivers a complete end-to end solution, a more seamless integration of system components, and a superior user experience for our customers worldwide,” concludes Yao.Add to Compare
Honeywell has announced the Honeywell Open Technology Alliance, a group of global security manufacturers that will collaborate to help businesses more easily secure and protect their facilities by increasing interoperability between third-party IP systems. As part of the initiative, Honeywell will work with security manufacturers to integrate their IP cameras and systems with its flagship MAXPRO® VMS video management system, as well as make its own devices more-easily compatible with other vendors' management platforms. The Honeywell Open Technology Alliance currently includes North America and European based manufacturers such as Milestone Systems, OnSSI, Heitel and IproNet Sistemas S.A. "Because security needs are becoming more complex and unique, we're seeing more companies and organisations today using technology from multiple manufacturers to create the solutions they require," said Don Roberts, Strategic Corporate Accounts, Honeywell Security Group. "The goal of the Honeywell Open Technology Alliance is to give these companies and their integrators more choices when designing their security systems, and to make the process easier." Currently in use at several major sites, MAXPRO VMS simplifies security by helping personnel control video subsystems dispersed across multiple facilities, and by enabling IP and analogue systems to seamlessly work together. With MAXPRO VMS, security personnel only need to learn a single programme to control the various subsystems, which can include virtual switchers, multiplexers and monitors. MAXPRO VMS - which integrates with several high-profile Honeywell systems such as its Pro-Watch® security management system and Rapid Eye™ and Fusion digital video recorders - displays data to security staff through a customisable graphical user interface. This common user interface gives operators the advantage of a similar look and feel across the disparate video components.In addition to helping manufacturers integrate their products with MAXPRO VMS, Honeywell will offer software development kits (SDKs) to enable its growing portfolio of IP cameras to integrate with other third-party video management systems (VMS). "Honeywell strongly supports open architecture, and now our open technology alliance formalises our processes and commits additional resources to developing strategic relationships that will bring IP solutions to market faster and drive value for our customers," said Scott Harkins, vice president and general manager of Honeywell's Video Systems business.Add to Compare
MOBOTIX has released an enhanced version of the intuitive Video Management Software platform, the MxManagementCenter for Windows and Macintosh. The latest version has been optimised to provide a full range of functions required for efficient and professional video surveillance management. The new MxMC has no system limits and can handle hundreds of cameras and users, live and recordings up to terabytes per camera. The number of recording servers is unlimited. MxMC 1.1 can be downloaded free of charge and is licence free. Playback technology MOBOTIX power playback technology of MxMC provides with direct fileserver access 60-times high-speed rewind and fast forward search capability of the recordings as well as a comfortable time lapse search, which reduces a 24-hour video footage down to nearly one minute for example. Remote access Thanks to the integrated scaling of image size and frame rate, MxMC supports optimised remote access of live images and playback of recordings over limited bandwidth connections, and is still able to retrieve related image details in full resolution. MxMC includes a complete user rights management. All functions and views can be easily defined per individual user, even down to a simple quad view arrangement with dedicated camera views. In order to become familiar with the exciting new features of MxMC. MOBOTIX is offering a number of free-of-charge trainings worldwide.Add to Compare
MOBOTIX is pleased to announce the latest major release of our new video management software. Download and experience the enhanced features of MOBOTIX ManagementCenter 1.2. New Features of MxMC 1.2 Enhanced export capabilities. MxMC allows the export of the complete video as an overview or the zoomed part of the image in different formats. This new function supports the export into different resolutions, frame rates, virtual PTZ views, including the transformation from 360° hemispheric (fisheye) to surround, panorama or special views independent from the export source. Histogram with MxEventStatistics. The display of events in a Histogram allows a fast graphical analysis of irregularities and related information. This is a perfect tool to get a quick overview of all events from the database, generated inside the camera without any additional PC. Playback analysis with post video motion. Automatic post video motion analysis allows high-speed search including time lapse of the complete video footage to find particular motion events. This will help to reduce playback research considerably. Smart Alarming features & scalable display area. Different events in the individual camera configuration can be defined as an alarm. This way, you can focus on the most important events, which can be defined as alarms depending on the specific application. Immediate display change between events and alarms is supported as well. User action log & system health check. If the recording path is not valid or accessible, you can analyse the correct server settings. Connection failures to cameras are directly shown for further investigation.Add to Compare
Samsung's Project Support Team has been set up in response to increased customer demand for knowledge driven help on large or complex integrated projects. The team will focus on Samsung's ability to harness the power of IP network based security solutions, whilst looking to increase the end-users' ROI by highlighting innovative ways the systems can be used for purposes other than security.End-users are increasingly expecting integration to play a key role in helping them achieve maximum return on their investment in a security solution. Samsung are therefore working towards providing system integrators with the ability to almost effortlessly integrate all the component parts of a security system. These could including intruder, fire, access control, perimeter protection and CCTV systems, as well as the opportunity to have them all interact with a building's building management system, and in the process have the freedom and flexibility to choose ‘best of breed' products.John Sayer who is managing the Project Support Team said: "I am delighted to be given the opportunity to head up the Project Support Team which has been established to provide hands-on support for the fast growing pan-European network of installers and system integrators who are recommending Samsung Techwin Europe Ltd's professional security solutions for large scale projects," said John. "With a complete product portfolio encompassing the very latest IP & network CCTV, Access Control and intruder detection products, the Project Support team clearly has a valuable role to play ensuring that our customers are able to specify the best complete solution for the job in hand. We will be available to offer advice and support from project conception and design, through to delivery."John has worked within the electronic security industry for over twenty years, during which time he has performed product management and pre and post sales support roles whilst with Cardkey, Johnson Controls and Maxxess Systems. John's understanding of IP network based security systems includes the design and implementation of video surveillance, access control, perimeter protection, intruder, fire and BMS systems into fully integrated solutions.The formation of the Project Support Team coincides with the introduction of Samsung's Total Security Manager (TSM) software, which enables the integration, monitoring and control of a diverse range of Samsung security systems via a single unified Graphical User Interface. TSM is packed full of features to make true integration possible and has an advanced alarm handling system which forwards information onto appropriate levels of security personnel and management, depending upon the designated importance of an incident.Add to Compare
Browse CCTV Software
CCTV software products updated recently
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Is your access control as effective as you think?Download
How to get buy-in from IT departments on IP video installationsDownload
The role of IT in physical access controlDownload
Matrox to unveil IP-based encoders, extenders and streaming appliances at Integrated Systems Europe 2019
- Belgian police install high-end Full HD Sony 4K surveillance cameras to secure streets and fight crime in Lokeren
- Interphone safeguards Ardmore Construction buildings by installing integrated security systems
- March Networks video surveillance and business intelligence solution deployed at Qatari bank
- APT Security Systems upgrades Nortech FeeMaster Smart parking management system at a luxury hotel in Bath