360 Vision CCTV Digital Video Recorders (DVRs)(13)
The Avalon H DVR presented by 360 Vision has D1 (720x576 pixels) recording resolution at 200 frames per second (FPS), 720x288 pixels at 200 FPS and 352x288 pixels at 400 FPS. The Avalon H comes in 4, 8 & 16 channel options. Individual recording resolutions can be set for each video channel and all models utilise the latest H.264 compression engine technology to reduce image file sizes to 10Kb at D1.Key Features: 10KB file size - D1 quality400 at CIF, 200 at 2CIF and 100 at D1 images per secondRemote access softwareUSB portsMulti camera action on alarmCovert viewEmbedded operating systemS-VHS multiscreen and VGAFunctionalityDVD writer built inCamera schedulingAdd to Compare
16 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 4, Quadruplex, 16 in, 4 out, 4 TB GB storage, 25 fps per cam fps storage rate, H.264, 720 x 576 resolution, HDD, Colour, 16 in, 4 out, Recording, playback, network and archiving, 420 x 88 x 390, 6.0, 12 V DC, 5 ~ 40, 20 ~ 80Add to Compare
4 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 1 x Composite, 1 x S-Video, 1 x Spot, 1 x VGA, Quadplex, 4 in, 4 out, 4 TB GB storage, 25 fps per cam fps storage rate, JPEG, 1280 x 1024 resolution, DVD/CD/USB, HDD, 4 in, 1 out, 4 in, 4 out, Record, playback, network and archive, 420 x 88 x 390, 6, 12 V DC, 5 ~ 40, 20 ~ 80Add to Compare
8 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 4, Quadplex, 8 in, 4 out, 4 TB GB storage, 25 fps per cam fps storage rate, JPEG, MPEG-4, H.264, 1280 x 1024 resolution, PAL/NTSC, DVD-R, USB, HDD, 4 in, 1 out, Colour, 8 in, 4 out, Record, playback, network and archive, RS485, LAN (10/100Mbps), DHCP, 420 x 88 x 390, 6, 12 V DC, 5 ~ 40, 20 ~ 80Add to Compare
16 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, Quadruplex, 16 in, 4 out, MPEG-4, 720 x 576 resolution, Record, playback, network and archive, 420 x 420 x 80, 6, 100 ~ 120 VAC, 60W, 5 ~ 40, 20 ` 80Add to Compare
8 channels, Real Time / Timelapse / Event recording, 2 in, 1 out, 500 GB storage, 100 fps fps storage rate, MPEG-4 ASP, 720 x 576 resolution, NTSC / PAL, CD-RW , HDD, 430 x 88 x 400, 7.3, 100 ~ 240 V AC, 100 W, 5 ~ 40, 0 ~ 90Add to Compare
Browse CCTV Digital Video Recorders (DVRs)
Digital video recorder (DVR) products updated recently
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorised access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organisation secure.
The sound of sirens in the distance is commonplace, nowadays. Whether related to a medical emergency or everyday crimes, such as theft, property crimes, and so on, we’re all accustomed to hearing these sirens by now. It is worth noting that many incidents that police respond to take place at night. According to a recent report by the Sleep Judge, more than half of murders, manslaughter, sexual assaults, robberies, aggravated assaults and motor vehicle thefts happen long after the sun has set. To anyone looking to address the round-the-clock security challenge, deploying the most comprehensive surveillance solution is a must, and this means, looking at the instrumental role illumination plays in video capture. Limitations of traditional video surveillance For surveillance cameras relying on video analytics and artificial intelligence (AI) to deliver functionalities such as facial recognition, license plate reading and motion detection, nighttime crimes can pose something of a problem. Without adequate illumination, images from video cameras are grainy and unusable.If surveillance cameras can’t be used to prevent, detect and/or resolve crimes that occur in these areas, the entire security operation is obsolete Without proper lighting, potential criminals and moving objects essentially become indistinguishable, at night, thereby inhibiting even the most advanced security technologies. This limitation of traditional surveillance technology not only hinders immediate police response, but it also stops crime investigations dead in their tracks. Often, without video evidence that is clear and discernible, conviction in a court of law is next to impossible. A common response to this issue is to place security cameras near streetlights or well-lit areas. After all, according to NPR, street lights are effective in deterring crime, as “there are people such as neighbors, pedestrians, or police, to actually see suspicious activity.” However, even if streetside and primary entrances are well lit, the areas that still need most to be surveilled are rear or side doorways shrouded by darkness, unlit back alleys, and so on. If surveillance cameras can’t be used to prevent, detect and resolve crimes that occur in these areas, the entire security operation is obsolete. Best-in-class security solutions must be able to see everything, day and night. A purpose-designed illumination solution Addressing this issue is easier than you might think. Much like a human eye needs some sort of light to “see,” so does video surveillance technology. Integrating external illuminators into a security solution can optimise camera performance exponentially, expanding a camera’s video capture and coverage abilities and ensuring the operation of video analytics, day and night. Opting for an external illuminator allows system integrators to select a device that matches the exact emission range of a camera’s field of view (FOV). The result is an evenly lit visual field, where captured images are clear and effective for security purposes. The two most common options available to integrators include infrared (IR) and white light illuminators. Each technology is built to optimise particular deployments, depending on their needs. Infrared versus white light IR illuminators emit IR light, which is invisible to the human eye and perfect for covert surveillance operations. When cameras need to be able to detect potential threats over long distances, IR illuminators are perfect for the job as they typically have longer emission ranges. IR illuminators are optimal for surveillance operations in license plate recognition, border patrol, safe cities, theme park, and medical sleep lab applications.Cameras deployed without proper illumination are rendered blind, especially at night If an end user needs to implement full-color video analytics for identification purposes, such as facial, object and license plate recognition, white light illuminators are undoubtedly an integrator’s best bet. IR illumination and traditional thermal security cameras, after all, are only able to provide black-and-white images, whereas object recognition software often identifies objects based on their color. White light illuminators installed alongside AI-powered surveillance cameras enable enhanced video image clarity, which, optimises video analytics performance. When customers want to physically deter suspicious activity, deploying white light illuminators is effective. A recent study out of Crime Labs New York found that businesses that deployed visible lights to deter crime “experienced crime rates that were significantly lower,” which “led to a 36 percent reduction in ‘index crimes’”. On top of all this, LED based white lights operate at low running costs and typically have long lifespans, saving end users thousands of dollars a year in energy costs without having to sacrifice surveillance optimisation. External versus built-in illumination Security customers looking to use lighting to deter crime and improve the performance of video surveillance may consider “all-in-one" solutions, as some cameras have LEDs (light emitting diodes) built into them. These LEDs typically encircle the lens and therefore shed light in whatever direction the camera is pointed. However convenient these may seem, built-in illumination can cause problems. First, LEDs built into cameras and next to other electronic components often cause heat to build up, which attracts insects that can trigger motion detection and obstruct a camera’s view. This heat buildup also shortens the LED lights lifespan. Built-in LEDs also tend to create “hot spots” with glare and reflection back into the camera, often because these lights only cover a 30-degree field of view (FOV), even though the average camera’s FOV is 90 degrees. This issue can severely limit a camera’s visibility, essentially rendering those remaining 60 degrees dark and unusable. All in all, when integrating lighting solutions into your security deployment, a cost-effective solution that enhances a camera’s video capture and coverage abilities, are external illuminators because they offer flexible choices of field of view and distances. Best-in-class security solution When it comes to criminal conviction in a court of law, “seeing really is believing.” Cameras deployed without proper illumination are rendered blind, especially at night, just as any security officer would be when patrolling the same unlit area. To guarantee end users the most reliable and highest performing security solution, consider integrating best-in-class illumination into your offerings.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF physical security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardisation organisations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 compression formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognises the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
360 Vision Technology, a UK CCTV manufacturing company, has announced that with effect of 15th January 2020, Sales Director Ashley Knowles has retired from the company, and the Security Industry. “Ashley has been a founding director of the business since 2003, having previously worked at Video Controls Ltd, and has thoroughly enjoyed being part of the 360 Vision team,” says Mark Rees, 360 Vision’s Managing Director. “Over the years he has contributed to make the company the success it is today, and that contribution will continue to impact well into the future. Ashley originally started his working life in the Construction Industry, and he is now setting up a small property company, as well as a recruitment joint venture with his youngest son. I am sure that both will benefit enormously from Ashley’s business and commercial experience.” Tremendous team of people Ashley commented: “I have thoroughly enjoyed working with Phil Burton, Mark Rees and the entire 360 Vision Technology team over the past 18 years. They are a tremendous team of people and I wish them continued success in the future. It has been an absolute pleasure. Finally, I would like to thank 360 Vision’s customers that I have managed and created personal friendships with. I am sure they will continue to receive exceptional on-going service from the 360 Vision team, and that those partnerships will continue to prosper.” Whilst it is a sad day for 360 Vison, Ashley will leave with many friends within the organisation and whom no doubt he will continue to keep in touch with. 360 Vision Technology would like to wish Ashley every success and happiness in his new ventures.
360 Vision Technology, the UK CCTV manufacturing company, is delighted to announce that it has appointed Sara Fisher to the role of Business Development Director. Formerly Sales and Marketing director at AMG Systems, with full responsibility for driving sales and marketing activities, Sara’s new role will be geared to supporting end users, systems integrators and consultants in the ITS, local authority and Oil & Gas sectors in the UK and international regions. High-performance camera and lighting technologies “Having worked with Mark Rees and the team for a number of years, I am extremely excited to be taking on this new position at 360 Vision Technology,” says Sara. “I have admired 360 Vision’s innovative and high-performance camera and lighting technologies for some time, and can’t wait to start promoting another great British brand. Primarily my aim will be to increase 360 Vision Technology’s global presence across a number of key market sectors.” “Supporting the company’s continued growth plan, we welcome Sara as an excellent addition to the 360 Vison Technology team,” says Mark Rees, 360 Vision’s Managing Director. “Having worked with Sara in a Technology Partnership with her previous company, AMG Systems, it was clear that her experience and tenacity was aligned with our own company’s ethos and aspirations. Sara’s role is set to lead us into new sectors, as well as strengthen those we are already making inroads into. I am thrilled to have someone of Sara’s calibre and experience join the 360 Vision team.”
UK CCTV camera manufacturer, 360 Vision Technology, announce that its Predator ‘all-in-one’ PTZ range is now an accredited Vision HS camera solution, certified to have completed the CAPSS approval process by the Centre for the Protection of National Infrastructure (CPNI). Ensuring cyber security measures are capable of protecting against the very real threats faced by surveillance system operators, 360 Vision Technology’s team of software developers is constantly working to ensure that these threats can be averted. Video management software “There has been a lot of negative press relating to the potential vulnerabilities integrators may accidentally introduce into their customers’ surveillance systems,” says Adrian Kirk, Strategic Account Director at 360 Vision Technology. “With concerns over the ease at which some edge devices can be used as an access gateway by cyber criminals, we’re taking cyber security seriously and helping integrators to mitigate that risk by specifying Predator UK manufactured cameras and Vision HS video management software." “Action to remove these threats is unlikely to happen fast as the UK market is still flooded by potentially unsafe Far East CCTV cameras that are being sold at bargain basement prices, which make them commercially attractive to some purchasers. The problem is further compounded by installation companies who may have limited expertise when it comes to providing tight network security.” Security and corporate confidentiality 360 Vision cyber security protection ensures surveillance capability is not compromised" "For example, steps should be taken to prevent the edge device’s set-up browser being accessed - enabling a hacker to disable or change critical camera settings, or worse, access the wider corporate network. However, supporting peace of mind for any integrator or end-user, when a 360 Vision Technology Predator camera is deployed at the edge, it cannot be used to enable unauthorised access to a security or corporate network.” Despite the increased emphasis on cyber security, and more and more sophisticated cyber-attacks taking place, many leading camera manufacturers still supply easy to get to, direct access points (typically via an RJ45 port), located within a camera’s power supply – but removing this risk is essential to ensure security and corporate confidentiality is not compromised. Cyber security protection “360 Vision cyber security protection ensures surveillance capability is not compromised, by removing the risks associated with insecure camera access,” Adrian concludes. “To provide additional protection for our customers, we are proud to announce that the ‘Predator HS’ product range is now an accredited camera solution to work with Vision HS - certified to achieve CAPSS approval by the CPNI.”
Related white papers
Ensuring cybersecurity of video
Security investments retailers should consider for their 2021 budget
Understanding video management systems
Best practices guide: analogue video to cloudDownload
Delivering a smart, secure and healthy workplace with cloudDownload
Are your technology providers keeping you in the dark?Download
Capture new opportunities with computer vision and video analyticsDownload
- Hanwha’s Wisenet camera captures live images of volcano eruption
- ADT Security Australia launches Essence SmartCare Solution for senior care
- Aprex Solutions uses IDS's camera-based cap control solution with AI to protect caps
- ATG launches the Bridge Deck Expansion Beam next-gen bridge protection technology for the Centre for the Protection of National Infrastructure