Technology & Trends - CCTV

How to use video analytics and metadata to prevent terrorist attacks

Today ‘terrorism’ has become a word we use and hear every day. The goal of terrorism is a media product - information delivered to nearly every house in the world. So, the weapon of terrorism is information. Therefore, the way we defend and prevent terrorism must also be based on intelligent processing of information - and an early awareness of potential threats and effective preventive action may eliminate most attacks. Video analytics, automated surveillance and AI decision-making...

Are your surveillance monitors prepared for the latest video technology developments?

Everybody has been hooked on the discussions about Analogue HD or IP systems, but shouldn’t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. The future o...

Six best practices of sales management in the security industry

A childhood friend of mine has made a nice career in coaching college football. As with most coaching careers, he’s had to make several moves over the years. He was the Linebackers Coach at a national powerhouse FBS school for a few years before getting promoted to Special Teams Coordinator. From there, he moved into a Defensive Coordinator at another FBS school. Not a national powerhouse, but he was the D.C. – a huge promotion. Although I’ve kept up with his progress, and have...

Critical Network of Things: Why you must rethink your IoT security strategy

In a world where hacking and denial of service are everyday threats, many feel that it is about time for the world of the Internet of Things (IoT) to undergo a reality check over its strategy and promotion before disaster strikes, reputations are lost and investors pull up stakes and run for the hills.   What is new about IoT? Having made, lost and then re-made my fortune in and around the industry over the past 20-plus years, I cannot help but smile over the level of hype — an...

The future of healthcare security: Violence response and emergency preparedness

There have been many changes in the healthcare environment over the past decade. The Affordable Care Act has been established, severe weather events are on the rise, violence along with active shootings continue to increase, behavioural health patients present treatment challenges and hospitals continue to consolidate to increase purchasing and service capabilities. Over the next decade, healthcare will continue to transform. Emphasis will be on financial reform, violence response, emergency pre...

How growing data sources are changing the surveillance industry

To say the surveillance industry has changed over the last quarter of a century is an understatement. From high-definition cameras and TVs to high flying drones and video analytics – the surveillance industry has shifted in ways we never expected to see in such a short space of time. What’s more, with such advancements in both quality and choice that’s now available in the market, it’s no wonder that revenue in the video surveillance market is set to double to $75.64 bill...

How intelligent IP cameras enhance predictive analytics

For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today’s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts – an important component of predictive analys...

Intelligent fire detection: Releasing the potential of remote monitoring

A new study reveals that intelligent fire detection systems have the potential to unlock more than 30 percent cost-savings on routine maintenance checks through real-time, data-driven remote monitoring. Kevin Mears, Product Manager for Kentec Electronics, describes how remote monitoring and predictive maintenance can meet the competitive challenges of the digital age. Leading economists have identified the convergence and synergies delivered by The Internet of Things – the interconnection...

Download: Innovative edge storage solutions for the video surveillance industry

Edge storage technology - the recording of video and storing it at the camera or on a directly attached storage device instead of in a centralised recording facility across the network - is quickly gaining acceptance and is being more broadly adopted into IP video surveillance applications. The use of edge storage in an IP camera enables video surveillance solution developers more flexibility and cost benefits in system design. By leveraging local microSD card-based storage, system integrators...

Home security systems: Why you need to upgrade from 3G to 4G LTE technology

“Netflix,” “twerk” and “selfie” were added to the dictionary. Boston Marathon bombing. Activist Nelson Mandela and actor Paul Walker died. Edward Snowden gave NSA classified documents to Wikilinks. These events may seem like they happened only yesterday, but they are some of the top news headlines from four years ago. Four years can feel like a very short time, and in four short years, every security panel installed by dealers to date will go dark. The curren...

How to predict events with intelligent fire and security systems

The security industry as we all understand it today is due for a much-needed paradigm shift. The solutions that security dealers and integrators are installing and deploying today have advanced considerably and for many, those systems do an excellent job safeguarding the homes and small businesses of their customers. However, all of those installed solutions have one inherent flaw: traditional fire alarms and security systems are only reactive in nature. By reactive, we mean that although today...

From counter-terror to retail: Gaining actionable data from video surveillance

Nowadays, there is a lot of hype around data and its utility for almost any industry – from security and law enforcement to business operations and retail. While we are inundated with information about data and its significance to business success, technological development and fulfilling the promise of the Internet of Things, we don’t always get practical feedback as to how to obtain this valuable data from the resources available to us. Security teams feel this challenge acutely....

ONVIF Profile A to drive interoperability for access control solutions

The need for interoperability, which is making different types of devices or technologies communicate with one another, is certainly nothing new in our industry. At Anixter, we have been testing interoperability in our Infrastructure Solutions Lab for many years, connecting devices and clients from different suppliers to our test server site to ensure that integrations and multi-supplier solutions are going to work correctly for our customers in real-world scenarios. Open standards in access co...

Download: Future-proof IP surveillance for harsh environments

Sea ports have a long tradition of handling important cargo, including equipment for oil and gas fields. These critical sites require complex security to protect vulnerable areas such as storage locations and unloading areas, as well as monitoring the surrounding waterways for emergency situations. Often, upgrading these sites with a future-proof security system can prove challenging, as there are likely to be expansive legacy systems in place. New systems may also need to be integrated w...

5 reasons to choose a commercial grade monitor for surveillance

In the security industry today we see many installers and integrators using standard consumer grade monitors for video surveillance. This is primarily due to budget constraints, but can end up costing significantly more over the life of the install. This is because most installs are now using HDMI connections primarily. A consumer monitor has HDMI input, so why isn’t it good enough? Well, consider the average cost of a 19.5” consumer monitor. The retail price is around $80-100 compa...

Why your business needs a holistic approach to managing critical events

In today’s world, businesses face a growing threat landscape. Looking back on just the past few months, there have been increased incidents of workplace violence (the recent New York city hospital shooting), terrorist activities (London Bridge attack, Manchester attack), and cyberattacks (Petya and WannaCry). While critical events have become more frequent, more complex, and costly to businesses, organisations’ emergency communications systems, plans and processes have remained surpr...

How the cloud reduces physical security system costs

The corporate mantra “Utilise TCO instead of purchase price when making purchasing decisions” means evaluating a project’s Total-Cost-of-Ownership over its lifetime period as the primary cost factor. It requires the corporate buyer to scrutinise the entirety of the investment as opposed to just the upfront purchase price. Like an iceberg, where the majority of the ice is below the surface, the total cost of ownership of a security system is typically much larger than the upfro...

21 ways to prevent workplace violence in your organisation

Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence. A prime example comes as an outgrowth of the multiple “going Postal” shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence programme throughout thei...

Robot revolution: Uncovering the real value of security robots

Robots have been in the spotlight lately, as tycoons like Elon Musk discuss the perils of automation and artificial intelligence (AI), and roving robots meet their watery demise. These recent events have unmasked a particularly interesting topic: The value of robots in the broader sense, especially as a security tool. The emergence of robotics, automation and AI is not new, but the ongoing discussion about how best to use these continues to fuel critics and supporters alike. Seattle-Tacoma Inte...

Lean Six Sigma tactics lead to increased airport efficiency and reduced flyer wait times

For many frequent flyers, the relationship between flyers and the Transportation Security Administration (TSA) has been at times, turbulent. For the better part of the last two decades, going through airport security has been met with groans over long wait times as flyers are encouraged to get to the airport earlier and earlier. TSA Lean Six Sigma tactics reduce wait time However, the tide may be turning a bit, as recent reports have shown a decline in TSA’s wait times, which can be att...

Body worn cameras: Overcoming the challenges of live video streaming

Can you imagine what it would be like if you could only look at your CCTV cameras eight hours after an incident, when your security team finish their shift? That is what 99% of current body cameras offer. Most body cameras can only record video, which limits them to settling arguments after the fact – who said what first in an altercation with the police? What sparked an incident with the door security team at a nightclub? This leads to a curious asymmetry of video and immediacy between m...

2020 Vision: Guide to protecting schools from the threat of terrorism

It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the Manchester Evening News, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event. Bury College released a statement followin...

How to get bottom-line business benefits with video surveillance data

With 60 percent of all of the world’s data expected to be created and managed by enterprises by 2025 according to IDC, it’s not surprising to learn that enterprise players have moved swiftly to help their customers and organisations maximise the opportunity around this massive data growth. However, when it comes to one of the most significant drivers of this growth in information—surveillance data— many enterprises struggle to understand how they can apply it to do more...

How to enhance IoT applications with network video surveillance

Remember the old adage “The whole is greater than the sum of its parts?” Nowhere is that truism more evident than when you add network video to the current generation of Internet of Things (IoT) solutions. Whether we’re talking about industrial IoT applications, “Smart – X” (city, building, parking etc.) or retail operations, integrating network video into the solution provides value far beyond simple situational awareness. Optimising sophisticated video tec...

Detecting workplace violence with sound detection and audio analytics

Workplace violence has been on the rise in mental health facilities, schools, and detention centres across the country. According to the Occupational Safety and Health Administration (OSHA), “Nearly 2 million American workers report having been victims of workplace violence each year.” As such, security directors are looking for technologies to help identify and mitigate these incidents.  Increasing use of vocal aggression detection technology  Shift from video surveill...

Factors to consider when choosing a video storage system

What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department. In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system...

Download: Five things to consider before moving your surveillance video to the cloud

  Video surveillance systems have some unique requirements that set them apart from other types of enterprise applications.   Determining where and how the cloud can support these systems depends on a set of five primary requirements: bandwidth, storage, cost, security and accessibility. This March Networks white paper outlines some of the key considerations mid- and large-sized enterprises need to examine before deciding to move their video surveillance systems into the cloud...

Avoid damaging network breaches with reevaluated cybersecurity

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer...

Safety and security checklist for National Safety Month

According to the FBI’s most recent data, there were almost eight million property crime offences in the United States in 2015, while the Occupational Health and Safety Administration (OSHA) estimates roughly two million employees per year are affected by some form of workplace violence. Don’t let your business become part of these statistics. June is National Safety Month, so it’s the perfect time to reassess your facility security measures and look for improved and effic...

University bomb hoax highlights printer security vulnerabilities

Colleges and universities have been targeted in the last several weeks with a series of bomb threats received via campus printers and fax machines. Targeted institutions included Vanderbilt University, the University of Southern California, the University of Virginia and the University of Detroit Mercy, among others. Businesses were also among the targets. Around 100 organisations in all received print-outs, faxes or emails demanding that a $25,000 ransom be paid to a Brazilian citizen to avoi...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems