Technology & Trends - CCTV software

Cyber threat detection and protection takes centre stage at ASIS 2015

The potential costs and consequences of hackers getting through firewalls and onto the user’s computer networks can be devastating Theft of NATO data. Leakage of emails. Hackers setting up a live streaming website for over 100 New York City private webcams and even hacking the infrastructure servers of the U.S. government. As news of malicious takeover of private and corporate networks as well as incidents of malicious software programs, referred to as malware, conti...

Role of NVR in transitioning from analogue to IP surveillance without compromising on security and budgetary needs

NVR appliances ease analogue to IP transition by providing end users with a hybrid-ready product There should be a palatable migration path from a large installed base of analogue to the latest IP technology. The biggest missed opportunity related to network video recorder (NVR) NVR appliances in the video surveillance marketplace is effectively using existing analogue camera investments while transitioning to the network. For example, IP encoders can be utilised as a brid...

ASIS International 2015: Changing security industry trends with focus on value-added applications

Aventura continues to expands expand its feature set of products beyond PSIM As the 61st annual ASIS 2015 kicked off in Anaheim, Calif., it became increasingly clear that physical security continues to move from the realm of traditional intrusion detection, video surveillance and alarms into value-added applications that extend into new markets, uses and purposes – many of them centred on business and operational processes. While video surveillance, intrusion detection,...

Gunshot detection: A public safety and security resource for smart cities and beyond

The potential is huge for vendors in the security and technology industries that have gun detection-related services & products Gunshot detection systems are a fast growing trend that helps police and security guards to protect the public, capture criminals and collect forensic evidence for investigations. Gunshot detectors use digital microphones installed on (or in) buildings or along streets that listen for evidence of gunshots, provide near instantaneous notification,...

NVR manufacturers address common end user and market misconceptions

NVRs of the past may have been expensive & complicated to use, but today NVRs have user-friendly functionality How much do you know – or think you know – about network video recorder (NVR) appliances? Manufacturers in the sector say there is a lot of misinformation in the market about these workhorse system components. We asked several manufacturers to help us set the record straight. A common misconception among end users is that NVRs lack features and reliab...

ASIS International 2015 brings together security services, disruptive technologies and technological innovations

The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organisations against social media threats. The organisers of the ASIS International 61st Annual Seminar and Exhibits — ASI...

Security market offers range of NVR choices for integrators and end users

Network video recorders (NVRs) are at the centre of today’s IP video systems. The video surveillance market includes a wide range of NVR choices for integrators and end users alike. NVR appliances include purpose-built machines that have embedded software systems as well as servers that are sold by video management system (VMS) software vendors and that have been pre-installed and preconfigured with their latest software capabilities. This article will take a look at s...

Integrator Preferred Technologies adopts value engineering and custom expertise to simplify end-user interface

System integration is about adding value, and value-engineering is the solution to address the challenges facing the customer and their facility Leading systems integrators continue to embrace new technology and add a range of services focusing on IT, connectivity and integration. The trend will continue for forward-thinking companies seeking to differentiate themselves from the competition and gain a loyal following of end-user customers.  Pref-Tech - History and backg...

How to manage abundant video data and maximise operational efficiency

Increases in the number of cameras and storage capacity have created an overabundance of video information that is difficult to manage  Investment in video surveillance technology continues to increase as technology improves and security equipment becomes more affordable. Companies invest in video surveillance primarily to protect people and property, for both deterrence and more crucially for incident response. While there’s no doubt that the systems can provide a...

Oncam 360-degree panoramic casino security camera solutions

A 360-degree technology solution can be installed across the gaming floor, integrated right into the VMS and used for forensic purposes New 360-degree cameras are providing new video surveillance benefits to the casino market. MGM Resorts International has rolled out Oncam’s 360-degree technology solutions to the Aria, MGM Grand, Bellagio, Mirage and New York-New York properties along the Las Vegas strip. More specifically, the surveillance team at the Aria manages more...

Security as an integrated enterprise-wide operation in the wake of 9-11 World Trade Center terrorist attacks

9-11 caused a sharp refocus of attention on security assessment and risk management Fifteen to 20 years ago, security was a relatively sleepy, small-time business. Companies typically hired a guard or two to walk around the property, usually at night, sometimes during the day. If a guard spotted someone who wasn’t supposed to be there, he (it was usually a he) ran the person off. Larger companies had more sophisticated video and access control systems, but those system...

Importance of video network administrator in expansion and integration of surveillance technologies

Successful video infrastructure management requires visibility into the network’s behaviour The importance of video in an organisation has been growing over the past several years, almost exponentially. In retail, video images can help detect or deter theft by employees and patrons. Casinos use video partly due to state regulations, to ensure gaming activity is free of deceit or fraud. Branch offices use video to communicate with the head office. Schools use video for di...

Wireless devices vulnerable to security network hacking – are closed network security systems the solution?

Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things securi...

Behaviour monitoring and the role of video analytics in understanding casino behaviour

In casino surveillance, there must be an understanding of the behaviour of thieves and cheats. In particular, casinos must understand how the behaviour of a casino adversary differs from that of a legitimate guest. The end result of the understanding is that only threatening or fraudulent behaviour is challenged, leaving other guests free to simply enjoy their visits to the casino. Responding to behaviour anomalies requires understanding that comes from analytics capabilities...

Wavestore’s Better Together partner programme supports VMS security solution installation

Wavestore’s Better Together programme is designed to offer benefits to security installers and integrators An independent video management system (VMS) offers an open platform that can support the “best-in-breed” components of security systems, according to James Smith, director of marketing at Wavestore. “We offer a truly open platform and are truly independent – what we do really well is bring disparate technologies together,” says Smith....

Improving video surveillance effectiveness with IP and analytics

The key driver to growth in the IP market is the effectiveness and efficiency of the technology Technological advances in video surveillance are allowing end users the flexibility to do more with their systems than previously imagined. 2014 saw several new technological trends that shaped the future of the security market, with 4K and cyber security being the main drivers. The drift continues this year too with end users demanding HD video surveillance and wide-spread...

Casino security - HD IP cameras offer better video surveillance capabilities

Large busy casinos must maintain continuous surveillance of multiple tables and machines High-definition (HD) cameras are a perfect fit for the casino market. HD security cameras provide six times the resolution of analogue cameras, supplying images with sharper edges that easily identify faces, cards, dice, chips, currency, and fill slips. In addition, high-definition IP cameras can reduce camera count. A single, 1080p camera can effectively cover poker, roulette or craps tab...

Internet of Things (IoT) impacts video surveillance and security sector

This article by Keith Jernigan Sr., General Manager - MOBOTIX Corporation states the enormous impact of smart surveillance on various sectors. Highlighting the changing trends of video surveillance, Keith talks about the several benefits of IoT. He mentions that the new era will see video surveillance companies as more than just video security cameras sellers. To summarise, IoT is forecasted to conjure up businesses offerings, reduce costs and hazards, create jobs and opportunities, thus leading...

Smart home security risks with Internet of things (IoT)

Security and technology are rushing to offer home automation solutions and build out the Smart Home of connected devices and applications. As cameras, alarms, as well as, thermostats and other appliances become controllable and programmable using Internet-enabled smart phones, they are becoming part of a vast web called the internet of things (IoT). Achieving greater value through smart data exchange This network of physical objects or "things" embedded with electronics, software, sensors and...

Role of interactive services in maintaining steady RMR stream

Affiliated Monitoring’s UL-Listed monitoring centre with a second floor dedicated to areas for security company meetings Central monitoring stations have innovative approaches to assist security installing companies in growing their account base, adding value and boosting recurring monthly revenue (RMR). These companies do much more than simply monitor accounts – today they provide a host of services to give security installing companies the added edge in an extrem...

Beyond the camera: Body worn camera management and data storage opportunities

For police, BWCs can significantly improve how evidence is collected by recording the visual and audio actions Body worn cameras (BWCs) are becoming common place in law enforcement. While the spotlight for body cameras is on police in the news, BWCs are also sought after in security-related contracts for airports, campuses, correctional facilities and for private security. It’s quite likely interactions with police or security guards will be recorded (people who re...

Revisiting video analytics - applications beyond security

When video analytics first emerged in the security industry about a decade ago, there were high hopes it would instantly transform the landscape of video surveillance. Problem was, the technology was not mature and, in essence, was oversold as far as its capabilities. Analytics such as heat mapping, directional and license plate recognition technology have improved, lending themselves to applications beyond security and into the realm of actionable business intelligence Integra...

Video analytics address violence on city streets

Potential deployments of video analytics, or my own preferred term “intelligent scene analysis,” are being worked on by some of the best minds at university campuses across the United Kingdom. Later this year I will visit Kingston University whose Digital Imaging Research Centre is one of the largest computer vision groups in Europe. Violence prevention through analytical intelligence Here, I talk to Prof David Marshall of Cardiff University, who describes work...

Video technology transformation requires recalibrating the market

See bigger image Old pyramid w # of cams It’s clear that the network-based physical security industry has matured rapidly over the past few years. As the technology and other components of security solutions have advanced, so too have the customer’s expectations. Security solution companies must evolve in order to meet these new expectations. This requires an understanding of both the technology and the customers’ motivators, issues and hot buttons. Arr...

Cloud usefulness and effectiveness for physical security

The great increase in the amount of data is driving physical security to the cloud Physical security is migrating to the cloud — because it improves the performance of physical security technology while holding down costs. “Essentially what is happening is that physical security technologies are growing more powerful and generating more and more data,” says Steve Surfaro, business development manager and security industry liaison with Axis Communications, wh...

System integration major theme at IFSEC 2015

When asking exhibitors at IFSEC International 2015 about what drives their markets, many cite system integration as a key factor. And they want more of it. Integration as business “driving force” For example, John Davies of TDSI says customers are now seeking out system integration. “They want a solution rather than components, such as linking access control with building management systems or with an organisation’s IT network to control access to its computers,”...

Crowd movements and the impact on security

Unrealistic promises by over-enthused marketers and under-delivery by R&D departments have damaged the cause of video analytics almost since its inception. For me, the exaggeration reached its worst point when industry pundits suggested that we would soon be able to identify and alert on anomalous behaviour of the kind demonstrated by the Tsarnaev brothers in the moments before the 2013 Boston Marathon Bombings. Mainstream journalists speculated that the two Chechen broth...

Convergence of VMS and access control

Michael Byrden, Sales Director of ACT, considers the convergence of facility management. He describes how ACT, the access control manufacturer, has acquired a VMS and analytics development house in order to unify security solutions and bring customers nearer to the goal of a truly intelligent building. Desire for open systems Major acquisitions have been dominating the news recently and, even if this lays me open to a charge of naivety, I genuinely believe that they aren’t predatory. As...

Technology contributes to holistic security approach at primary/secondary schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...

Challenges to video analytics adoption

see bigger image Figure 5: Providing correct and useful results requires intersection of user intentions, VCA interpretation, and results provided by VCA tool The term Video Content Analysis (VCA) is often used to describe sophisticated video analytics technologies designed to assist analysts in classifying or detecting events of interest in videos. These events may include the appearance of a particular object, class of objects, or action. VCA technology employs a comple...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems