Geutebruck CCTV Consoles, racks & desks(1)
Browse CCTV Consoles, racks & desks
CCTV consoles, racks & desks products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilisation of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat recognition The first step in effectively defending against a threat is recognising that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilise the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilising all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorised staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic response systems Once an intrusion attempt is discovered, it is important to act fast. Organising a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilise the protection of a physical fence or wall 3. Deterring suspicious activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorised personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, defend, dispatch and handle The possible danger has been identified, recognised and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realising this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect evidence and debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilised for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyse, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Security control rooms should be functional and durable, and their aesthetics should incorporate matching colours that are conducive to a 24/7 operating environment—not too much contrast and easy on the eyes. Another factor driving aesthetics is an enterprise’s desire to create a ‘showpiece’ to demonstrate a commitment to security for shareholders and other stakeholders. “Everyone wants to have a good-looking control room and a cost-effective design,” says Matko Papic, Chief Technology Officer of Evans Consoles. Role of lighting and aesthetics in control rooms “Lighting is a critical factor for operators,” adds Papic. Studies of control rooms have sought to address issues of circadian rhythms (physical, mental, and behavioural changes that a person undergoes over a 24-hour cycle, based on responses to light) and the impact of changing light colours throughout the day. Flexibility is key. Properly adjusted light can increase alertness at 2 a.m.; controlling the colour, tone and intensity of light can increase productivity any time of day. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting Aesthetics, depending on the control room, can be very important, agrees Randy Smith, President of Winsted. His company accommodates aesthetics by using a variety of matching laminates, solid (Corian-type) surfaces, and sometimes real wood. They can put in a console with matching work surfaces, a credenza or other furnishings, or can even match existing décor in a facility. Customised tailored furnishing Security control rooms, often operating in glass enclosures, are often used to “make a statement” about the security of a facility, says Smith. Companies want the control rooms to be up-to-date, and have “cool designs.” Sometimes they want to add a company logo to a work surface or side panels, or they want to employ corporate colours in the design. Winsted can customise its offerings to meet any such requirements, says Smith. In too many instances, the control room is an afterthought: They just install furniture that fits with the monitors. How the furnishings are tailored to the operator is often not considered, says Papic. He offers several other considerations: Will the furniture last the lifetime of the control room? How adaptable is a design to possible future changes, whether larger monitors, managing cables, or ability to reconfigure the console? Furniture should not be viewed as a transactional item; there are more issues to address beyond physically housing the equipment, says Papic. Read part 5 of our Control Rooms series here
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The public as an additional security and safety sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organisation recognised that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their mobile devices that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combatting control room information overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application of roaming smart sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging existing hardware infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that whilst many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organisations need to do is know how to switch it on and leverage it.
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is showcasing its unique portfolio of video, access control and communications platforms that provide users with the highest levels of system integration, management and incident response technology at Expo Seguridad 2019 (booth #2524). Solutions on display include the Latin American public debut of Maxxess InSite awareness and response coordination system, the enhanced eFusion security management software and Maxxess’ MX+ Web Dashboard, the newly designed Ambit event management communications software, and a new Multi-Form Panic Solution that provides the lowest cost of entry for proactive protection. Combining systems and human intelligence Maxxess solutions empower people and transform security operations to deliver new levels of situational awareness"“Maxxess solutions empower people and transform security operations to deliver new levels of situational awareness and business intelligence,” said Nancy Islas, President of Maxxess Systems. “By combining systems intelligence and human intelligence, our unique open architecture and intuitive platforms truly offer powerful, scalable solutions that can help stop events from happening, and better control incidents from the moment they begin.” The Maxxess solutions being demonstrated at Expo Seguridad 2019 include: Maxxess InSite awareness and response coordination system combines “system intelligence” and “human intelligence” to detect and respond to unfolding events in real time – all of which are queued, organised and displayed on a highly-intuitive user interface. Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. eFusion security management software is a “system intelligence” solution that integrates and correlates data from surveillance, access control and various other physical security and facility operations’ data onto a comprehensive monitoring and reporting dashboard. eFusion security management software eFusion provides video and access system management and control capabilities along with alarm monitoring eFusion provides video and access system management and control capabilities along with alarm monitoring; remote access credentials tracking, authorisation, and de-authorisation; door/access status; and more. Proven globally in installations around the world, new enhancements to eFusion include new Flow Control with auto expiration, and advanced data processing. Flow Control allows users to configure the specific door(s) that must be used first to gain primary access to a facility with programmable timer setting. Advanced data processing correlates databases to accommodate complex relationship rules between the authoritative database and the Maxxess database. Enhancements to MX+ Web dashboard To further simplify user engagement with eFusion, Maxxess Systems’ MX+ Web Dashboard has also been further enhanced with new features including system-wide lockdown; Video Management System (VMS) integration; mobile cardholder management operations with badge printing; and access control status indication in an easy-to-read graphical format and schedule configuration. Ambit event management communications software provides real-time “human intelligence” for alerts, notifications and status assessment via users’ smartphone and/or tablets, along with access control management. Ambit’s extensive communications and access control functionality provides security management and first responders with the critical on-site information and access system management they need to best handle unpredictable crises. Ambit and Multi-Form panic solution Maxxess Systems’ new Multi-Form Panic Solution provides the lowest cost of entry for proactive protection A cloud-based solution, new enhancements to Ambit include: an app design for easier operation including: a status update window; an easily accessible panic button; support for multiple photos from the field; the ability to assign reports to designated groups and/or individuals; enhanced filtering for target audiences to receive mass broadcasts; NC4 integration to external intelligence software to enhance information gathering; auto-location detection for event status posts; and a texting option for users without the app to receive relevant mass broadcasts. Also featured is Maxxess Systems’ new Multi-Form Panic Solution, which provides the lowest cost of entry for proactive protection. Available for implementation with any Maxxess System platform or as a stand-alone solution, it can be configured on any mobile device, PC keyboard or wearable device. Expanding technology partners list Maxxess Systems also continues to expand its roster of technology partners and integrations with the addition of: Mercury LP and MR62e controllers; OTIS Elevator Compass Overwatch; enhanced Milestone Systems’ MIP and Geutebruck GeViScope integrations; as well as new integrations with Salient Systems, Avigilon, ISS (Intelligent Security Systems), Nedap and RemotePoint.
Geutebrück, international specialists for video systems in the security and process optimisation sectors in Germany, will be represented with offices in India and Malaysia from May onwards. From these locations, customers from the logistics, industry and government sectors will be supported more closely. Geutebrück Southeast Asia is focussed on the regions bordering Malaysia, Singapore, Indonesia, Thailand, Vietnam and Hong Kong. The office premises in the Malaysian capital Kuala Lumpur are a sales, representation, showroom and training centre in one. Individual response to each project Our customers in Southeast Asia appreciate the flexibility of being able to respond individually to each project"Geutebruck Gemini India Solutions Limited is the name of the joint venture between Geutebrück and Gemini Software Solutions. Gemini is a subsidiary of the Kanoo Group of Companies, Bahrain, and provides software solutions worldwide. Geutebrück Gemini India Solutions Limited is based at World Techno Park in Trivandrum, and in New Delhi, India. "Our customers in Southeast Asia appreciate the flexibility of being able to respond individually to each project, rather than offering ready-made solutions. And they rightly expect us to be personally at their side with support and service," explains Managing Director Katharina Geutebrück, who is the second generation to run the family business with her husband Christoph Hoffmann. Showcasing versatile video solutions There is also a change of location in Germany. The software developer's capital city branch relocates to Berlin-Adlershof and showcases its versatile video solutions in a state-of-the-art showroom. "All over the world, our solutions for securing ministries, institutions or museums and for optimising processes are almost invisible. In our capital city office, we show what makes us a successful global player,” adds Christoph Hoffmann. The innovative development of software products, also in the field of artificial intelligence, and successful international projects have made Geutebrück a respected expert and world market leader for video solutions ‘Made in Germany’. Company headquarters, manufacturing plant and R&D centre are in Windhagen, directly located between Cologne and Frankfurt.
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is debuting the company’s Maxxess InSite Awareness and Response Coordination System to the American market here at ISC West 2019 (booth #6065). Maxxess InSite uniquely combines security, communications, business intelligence and data integration on a single, easy-to-use platform. “Maxxess InSite empowers total awareness by providing users with unprecedented capabilities far beyond basic system management and incident detection to help prevent incidents from happening,” said Nancy Islas, President of Maxxess Systems.Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination “A new benchmark for security and business intelligence software platforms by every standard of measure, Maxxess InSite coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected with unprecedented simplicity of operation.” Early incident detection and action Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which are queued, organised and displayed on a highly-intuitive user interface. Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess Insite harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. Combines technologies onto a unified platform It meshes the capabilities of virtually any system and technology onto a unified platformIt meshes the capabilities of virtually any system and technology onto a unified platform including: video surveillance; access control; two-way communications; GPS/IPS location technologies; intrusion detection; fire safety systems; perimeter detection/protection; HVAC/building management; smart phones and tablets; ID/credential badging; guard tour; visitor management; time and attendance; license plate recognition; panic device/hotkey emergency notification; reporting/forensics; wireless sensors; elevator/escalator control and database integration. Over 50 different manufacturers are already integrated with Maxxess InSite, providing more capabilities and functionality than any other cross-platform solution available. New integrations include: Mercury LP and MR62e controllers; OTIS Elevator Compass Overwatch; enhanced Milestone Systems’ MIP and Geutebruck GeViScope integrations; as well as new integrations with Salient Systems, Avigilon, ISS (Intelligent Security Systems), Nedap and RemotePoint.
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
- eyevis provides 24/7 monitoring and security technology for wind farms in UK
- MOBOTIX video surveillance: Protecting shoppers at Forum Bornova, Izmir
- Thinking Space provides control room furniture for new CCTV hub at Blackburn with Darwen Council
- Custom Consoles MDesk-Technical furniture deployed at Warrior Insight