Tecton CCTV Consoles, racks & desks(1)
Browse CCTV Consoles, racks & desks
CCTV consoles, racks & desks products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilisation of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat recognition The first step in effectively defending against a threat is recognising that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilise the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilising all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorised staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic response systems Once an intrusion attempt is discovered, it is important to act fast. Organising a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilise the protection of a physical fence or wall 3. Deterring suspicious activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorised personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, defend, dispatch and handle The possible danger has been identified, recognised and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realising this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect evidence and debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilised for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyse, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Security control rooms should be functional and durable, and their aesthetics should incorporate matching colours that are conducive to a 24/7 operating environment—not too much contrast and easy on the eyes. Another factor driving aesthetics is an enterprise’s desire to create a ‘showpiece’ to demonstrate a commitment to security for shareholders and other stakeholders. “Everyone wants to have a good-looking control room and a cost-effective design,” says Matko Papic, Chief Technology Officer of Evans Consoles. Role of lighting and aesthetics in control rooms “Lighting is a critical factor for operators,” adds Papic. Studies of control rooms have sought to address issues of circadian rhythms (physical, mental, and behavioural changes that a person undergoes over a 24-hour cycle, based on responses to light) and the impact of changing light colours throughout the day. Flexibility is key. Properly adjusted light can increase alertness at 2 a.m.; controlling the colour, tone and intensity of light can increase productivity any time of day. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting Aesthetics, depending on the control room, can be very important, agrees Randy Smith, President of Winsted. His company accommodates aesthetics by using a variety of matching laminates, solid (Corian-type) surfaces, and sometimes real wood. They can put in a console with matching work surfaces, a credenza or other furnishings, or can even match existing décor in a facility. Customised tailored furnishing Security control rooms, often operating in glass enclosures, are often used to “make a statement” about the security of a facility, says Smith. Companies want the control rooms to be up-to-date, and have “cool designs.” Sometimes they want to add a company logo to a work surface or side panels, or they want to employ corporate colours in the design. Winsted can customise its offerings to meet any such requirements, says Smith. In too many instances, the control room is an afterthought: They just install furniture that fits with the monitors. How the furnishings are tailored to the operator is often not considered, says Papic. He offers several other considerations: Will the furniture last the lifetime of the control room? How adaptable is a design to possible future changes, whether larger monitors, managing cables, or ability to reconfigure the console? Furniture should not be viewed as a transactional item; there are more issues to address beyond physically housing the equipment, says Papic. Read part 5 of our Control Rooms series here
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The public as an additional security and safety sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organisation recognised that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their mobile devices that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combatting control room information overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application of roaming smart sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging existing hardware infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that whilst many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organisations need to do is know how to switch it on and leverage it.
AMG, the British manufacturer of CCTV transmission solutions and sophisticated 5 Megapixel cameras, and Tecton, a leading designer, developer and manufacturer of CCTV solutions, announces that Tecton has integrated AMG’s Wonderbox - a series of ruggedised Ethernet switches - with Tecton’s Servalan Network Video Recorder, the Mate stand-alone solution for single camera recording, as well as with Liberator – Tecton’s Video Evidence Recorder for combined recording of IP and analogue cameras. Chris Hall, MD and founder of Tecton, says “The Wonderbox integrates seamlessly into our technology. The demand for integration was prompted by a highways project where the Wonderbox was part of the core backbone transmission solution. All we had to do was connect it, point to the correct IP address, and we were up and running with the recording of the footage. Tecton’s technology is widely used in government and transport surveillance solutions. We have a number of existing large scale projects in the rail sector and I can easily envisage a number of applications where the Wonderbox will ease the upgrade of legacy solutions to include IP cameras in a hybrid technology solution. Not only that, it will providing savings for the customers, as the existing infrastructure can be upgraded without the need for third party connectivity products.” Sara Bullock, Sales & Marketing Director of AMG Group, says, “We are delighted with Tecton’s decision to facilitate complete integration with their DVR and NVR range. Tecton is renowned for their ruggedised and highly complex solutions for Critical National Infrastructure, Government, Transport and Rail solutions. With the Wonderbox we now have an approach that allows you to retain existing analogue equipment alongside new ‘IP’ cameras/devices within the same network, dramatically reducing infrastructure requirements and capital expenditure on hardware for new systems. With the integration with AMG’s Wonderbox range, another step has been taken in bridging the IP-analogue gap, particularly in the transport sector.”
Martin will focus on UK and pan-European distribution sales for next generation DirectIP HD surveillance solutions IDIS has announced the appointment of Martin Cowley to the role of Channel Manager based out of the IDIS European headquarters in Brentford, London. Martin joins IDIS to focus on UK and pan-European distribution sales for next generation DirectIP high-definition (HD) surveillance solutions. Martin will be responsible for leveraging and nurturing new and existing channel partnerships while developing the DirectIP channel-marketing program to drive value for IDIS distribution partners. Martin brings with him over twenty years’ experience in the security industry, particularly in video surveillance, where is well known for being instrumental in the phenomenal growth of Silent Witness. A relatively unknown entity outside of Canada in 2000, Martin developed the UK channel for Silent Witness contributing to a huge increase in turnover and the subsequent acquisition by Honeywell in 2005. Martin has also held sales management positions at Tecton, Cieffeand Grandeyeas well as forming his own consultancy business that helped launch some of the world’s leading security brands. “We are thrilled to welcome Martin on-board with IFSEC nearly upon us. Our DirectIP solutions will provide the market what many have been waiting for – simple and affordable networked HD surveillance and Martin will play an instrumental part in our launch next week,” noted Brian Song, Managing Director, IDIS. Martin Cowley, Channel Manger, IDIS commented, “I’m delighted to be joining IDIS when the incredible pre-show interest and demand in DirectIP are validations of the understanding and confidence in IDIS as a proven leader in surveillance solutions. I’m looking forward to introducing DirectIP during IFSEC and demonstrating the value we will deliver to our distribution partners.” DirectIP from IDIS will launch this year at IFSEC International, NEC Birmingham, on 13th – 16th May 2013 in Hall 5 Stand D30. For more information, e-mail email@example.com.
Vemotion IP wireless video encorder have been integrated with Tecton DVR / NVR products Vemotion Interactive, specialists in live video transmission over low bandwidth connections, recently announced that they have agreed a technical integration project with Tecton. Tecton will integrate with the Vemotion IP based wireless video encoders so that Vemotion video streams can be recorded by their DVR/NVR products in a control room environment. The solution provides customers with the ability to transmit low bandwidth video images to and from the Tecton recorders. Customers can record and replay real time footage, at high quality, all of the time even when on the mobile network. Tecton records IP and Analogue connected cameras. Any camera streamed anywhere provided as an easy to install and maintain solution. Tecton customers will now be able to take advantage of the Vemotion solution using their existing recording equipment. Vemotion customers will be able to utilise the Tecton industrial grade back office and front end video recording solution. “Both Vemotion and Tecton are focussed on providing high quality real time images that meet real business needs,” commented Stewart McCone, Managing Director of Vemotion Interactive. “This integration project will add real value for customers with wireless video requirements,” added McCone.
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
OSDP is the strongest access control for your businessDownload
- eyevis provides 24/7 monitoring and security technology for wind farms in UK
- MOBOTIX video surveillance: Protecting shoppers at Forum Bornova, Izmir
- Thinking Space provides control room furniture for new CCTV hub at Blackburn with Darwen Council
- Custom Consoles MDesk-Technical furniture deployed at Warrior Insight