MOXA Video Servers (IP Transmission) / Video Encoders(6)
1 channels, H.264, M-JPEG, MPEG-4, TCP, UDP, HTTP, SMTP, FTP, NTP, DNS, DHCP, UPnP*, 10/100BaseT(X) , 720 x 576, 30 fps, PTZ, Internet Explorer 6.x or above, CPU: Pentium 4, 2.4 GHz or above; Memory: 512 MB or above;OS: Windows XP/2000 with SP2 or above, 53 x 135 x 105, 900 , 5.5 W, 24 VDC/VAC, 0 ~ 60, IP30, 5 ~ 95Add to Compare
4 channels, H.264, M-JPEG MPEG-4, TCP, UDP, HTTP, SMTP, FTP, NTP, DNS, DHCP, UPnP*, 720 x 576, 30 fps, PTZ, Internet Explorer 6.x or above, CPU: Pentium 4, 2.4 GHz or above Memory: 512 MB or above OS: Windows XP/2000 with SP2 or above, 80 x 135 x 105, 1,110 , 7.5 W, 0 ~ 60, IP30, 5 ~ 95Add to Compare
Browse Video Servers (IP Transmission) / Video Encoders
Video server (IP transmission) products updated recently
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (CCTV at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labour to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open architecture platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple licensing processes and pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing and matching camera license types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto camera detection and configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart camera driver technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance of network security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomised video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Moxa's EDS-G500E and EDS-518E/528E DIN-rail switches support Turbo Pack 3, and all of Moxa's industrial Ethernet switches will support the new firmware by 2017 Moxa, a provider of network infrastructure solutions for the Industrial Internet of Things (IIoT), announced a new firmware upgrade for its industrial Ethernet switches with major enhancements for its security functionalities. This new firmware, called Turbo Pack 3, is not only compliant with the IEC 62443-4-2 level 2 cybersecurity standard, but also supports other security management features, such as MAC Address and RADIUS authentication to prevent from unauthorised access, known security leaks and unknown attacks. At present, Moxa's EDS-G500E and EDS-518E/528E DIN-rail switches support Turbo Pack 3, and all of Moxa's industrial Ethernet switches will support the new firmware by 2017. Increased device-level security According to an ICS-CERT report, cyber-attacks on the critical manufacturing sector increased by 50% from 2014 to 2015. The report noted that a lack of proper access management and network probing are among the most common network vulnerabilities. One of the key mechanisms to ensure a safe and reliable network is to strengthen device-level security. Turbo Pack 3 ensures Moxa's switches comply with the IEC 62443-4-2 level 2 standard, which provides technical security requirements and guidelines for network device suppliers and engineers. Moreover, the new firmware upgrade supports MAC authentication bypass via RADIUS server, and also fixes certain security vulnerabilities to protect the switches from malicious intrusion. Ensure network availability The firmware upgrade also supports enhancements in redundancy technologies, such as V-ON, traffic management, and real-time event notifications. With these new functionalities, Moxa's switches are enable higher network availability and reliability, which is crucial for mission-critical applications.
SeeTec video technology helps to detect situations at an early stage and thus assists in avoiding consequences Despite of the development of alternative and renewable energies, oil and gas still represent the engine of the world economy. Exploration takes place under increasingly challenging conditions often in remote locations. Security requirements, already high, continue to rise. This is not surprising as incidents during up-, mid- and downstream processing can cause immense damage to people and the environment. Video technology systems from SeeTec help detecting situations at an early stage and thus assist in avoiding consequences – at all process levels. SeeTec Cayuga for staff safety Video technology is generally used on drilling vessels and –platforms to monitor the drilling and mining process and to ensure the staff’s safety. SeeTec Cayuga can easily be integrated into this process and also into higher level systems such as DCS for example. Video is then a part of an overall solution using TCP triggers or I/O modules to communicate with the sensor- and control technology. If for example a sensor detects high pressure in the system, an automatic video fly-out window showing video streams of relevant areas is displayed on the screens in the control room. SeeTec Cayuga also supports thermal cameras. Using them, high temperatures can be detected based on the colours displayed. Using video technology critical situations can be detected and validated much faster, giving staff more time to react on the basis of more information. Video analytics with SeeTec video management software Especially the transportation of gas and oil from the production sites to the refineries and the tank farms is a dangerous process. Big parts of overland pipelines lead over uninhabited areas without significant infrastructure, making the monitoring of leaks complicated. Also in politically unstable regions the risk of attacks is a serious threat. If the transportation is done by sea the risk of damage and harm affects not only the vessel but also has impact on the environment. Using SeeTec video management software pipelines are monitored permanently over long distances even if there is only low banded infrastructure. By using intelligent video analytics and by linking to process monitoring systems the attention of the security staff is drawn to possible dangers or incidents. SeeTec video systems provide protection for every need. With SeeTec the building perimeter is continuously monitored Perimeter protection with integrated security systems Next to the operational safety in refineries and production plants, safeguarding against unauthorised access is an important issue. SeeTec video systems provide protection for every need. With SeeTec the building perimeter is continuously monitored. Through the integrated video analytics and the additional analytics interface to third-party applications an automatic perimeter protection is supported. So, for example, a person trying to climb over the premises’ fences will be visualised automatically on the Client in the control room. A built-in license plate recognition solution and the integration of access control applications complement the SeeTec range. In the refinery the video system can also be seamlessly integrated into production processes. It is possible to trigger alarms or other actions over sensors or management systems by using TCP signals or I/O-modules. SeeTec’s modular architecture makes it easy for the product portfolio to grow with increasing demands and/or the growing operational areas. Using distributed installations it is possible to combine several locations to just one bandwidth-optimised system. An extended safety structure ensures that the system keeps on recording images and stays in operational mode even if the management or recording server fails. Retail security Gas stations are at the end of the value chain. They are not struggling with process safety but with robberies and thefts. SeeTec delivers video solutions, which perfectly reflect the branch structure of such a business. SeeTec keeps the costs for the camera infrastructure low by realising a bandwidth-saving usage involving several locations and by using intelligent camera features (VCAM). At the gas station the video technology can also be connected directly to the business processes, so for instance it is possible to combine the video images coming from the pump or the cash area with the accounting data by using the SeeTec POS-Interface. With the automatic license plate recognition a petrol theft can be identified easily – if a car, which already was registered with a tank fraud, is recognised in front of a gas pump, the pump can be locked. Benefits Modular and flexibly expandable solution Support of a great number of cameras of all leading manufacturers (incl. thermal cameras, LPR cameras, outdoor cameras for special requirements) Integrated video analytics and license plate recognition Communication with third-party systems using TCP signals or I/O modules (Moxa, Adam etc.) Easy handling and operation, also on touch-based systems or mobile devices Project experiences and certifications in the oil & gas-sector
The Moxa University aims to ensure smooth knowledge transfer across the supply and value chains The new Moxa University is a formal education and certification program to impart profound knowledge of network design, installation and maintenance to Moxa´s distribution partners. Moxa's increasingly strong footprint in industrial installations across Europe has been a major achievement, and a source of pride for Moxa´s European team. The reliable operation of these installations is Moxa´s primary objective. The Moxa University aims to ensure smooth knowledge transfer across the supply and value chains - from the developers of Moxa products to the customer´s network administrators. Formal training program that supports Moxa´s partners Industrial networks and their components, such as embedded computers, automation systems, or video surveillance devices are challenging microcosms far beyond the selection of reliable products. To anticipate and counteract their challenges, Steve Lin, Moxa Europe's General Manager, decided to establish a formal training program that supports Moxa´s partners, and ultimately Moxa´s customers, in achieving reliable industrial operation. "Moxa's aim has always been to provide reliable networks. Now we want to make sure that our customers learn how to convert our reliable products into reliable operation and consequently added value for themselves", says Steve Lin. “This is why we developed a training program that addresses our customer´s needs, and those of our partners, and our employees. They all can train to become `Moxa Certified Engineers´.” To ensure that the knowledge transfer can take place right where Moxa´s customers need it, Moxa reverts to their broad network of official distribution partners that all attend the annual Moxa Technical Certification trainings. The best of these Moxa Certified Engineers have recently undergone an additional train-the-trainer program. As a result, the first four graduates of the program, coming from Moxa distributors in Poland – Elmark Automation, Spain – Tempel Group, UK - IT4Automation & Croatia – Selmet, can now call themselves Moxa Certified Trainers and share their knowledge in so-called Moxa Training Centers. Centrally managed updated set of training materials The four distributors with Moxa Training Centers form the basis of a growing network of Moxa Authorised Training Centers situated in close proximity to Moxa´s European customers. They benefit from a centrally managed, continually updated set of training materials that include the experience and expert knowledge of the Moxa Certified Trainers all over the continent.
Physical security supports a future-proof cyber security strategyDownload
Combining systems intelligence and human insight for superior securityDownload
Three reasons for adopting open architecture access control solutionsDownload
- Airbus’ STYRIS, Vessel Traffic Services upgrades the Port of Sydney
- March Networks’ video solution used at Quik-E c-stores to protect profits and recoup losses
- Rasilient completes Phase II of the video surveillance system upgrade at Fairbanks International Airport
- Panasonic’s facial recognition technology helps Jumbo Ten Brink Food win the safest store award in the Netherlands