IP cameras News

Getting to know Scott Brothers, Executive Vice President of Corporate Development at Oncam

Scott Brothers is the Executive Vice President of Corporate Development at Oncam. He has worked at the company since July 2014 in several different roles. Prior to Oncam, he worked at Axis Communications and TAG Company.  How did you come to work in the security industry? In 1996, I was training to become an electrical engineer when I spotted an ad for an apprentice engineer. I applied and was successful in being chosen to join the Sensormatic apprenticeship scheme in the United Kingdom a...

Video surveillance storage solutions: The good, the bad and the ugly

When a news story of global interest begins to break, reporters across the world will scramble to find CCTV footage of the event, however isolated the incident may seem. Given the average of one camera installed for every twenty-nine people on the planet, it is perhaps unsurprising how often a persistent journalist, investigator or member of the public will actually be able to uncover footage. In fact, this number is estimated to be as high as one camera for every eleven people in mature market...

Six advantages of an effective PSIM solution

PSIMs have had a bad rap in the pro security industry for a multitude of reasons; ranging from suppliers overpromising on integration and control capabilities to complexity of implementation and use. However, there is a silver lining to this story. Today, advanced PSIM solutions are being successfully deployed in commercial applications with the ability to integrate previously disparate professional access, video, notification, building operations and more onto a unified control and management...

How do customers under-utilise their video security systems?

Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilise their vi...

Four ways the cloud improves your cyber security posture

Adoption of the cloud is not slowing down. In fact, what’s happening is quite the opposite. According to IDC, worldwide spending on cloud computing is expected to reach $162 billion USD in 2020, growing at a compound annual rate of 19%. This isn’t surprising when you consider that more organisations are looking outside their own environment for solutions that will help them become more agile, maximise resources and save money. Yet, while this study and countless others show that mo...

How to use video analytics and metadata to prevent terrorist attacks

Today ‘terrorism’ has become a word we use and hear every day. The goal of terrorism is a media product - information delivered to nearly every house in the world. So, the weapon of terrorism is information. Therefore, the way we defend and prevent terrorism must also be based on intelligent processing of information - and an early awareness of potential threats and effective preventive action may eliminate most attacks. Video analytics, automated surveillance and AI decision-making...

What is an acceptable life cycle for a physical security system?

Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions transl...

Are your surveillance monitors prepared for the latest video technology developments?

Everybody has been hooked on the discussions about Analogue HD or IP systems, but shouldn’t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. The future o...

Six best practices of sales management in the security industry

A childhood friend of mine has made a nice career in coaching college football. As with most coaching careers, he’s had to make several moves over the years. He was the Linebackers Coach at a national powerhouse FBS school for a few years before getting promoted to Special Teams Coordinator. From there, he moved into a Defensive Coordinator at another FBS school. Not a national powerhouse, but he was the D.C. – a huge promotion. Although I’ve kept up with his progress, and have...

Las Vegas Massacre demands reevaluation of hospitality sector security

The massacre in Las Vegas is both sadly familiar and terrifyingly novel. Because of the recent series of violent attacks on innocent people gathered in public places, high body counts are no longer unheard-of, although the 59 dead after the Las Vegas tragedy sets a depressing new record. These news stories have become so grimly commonplace as to dull our collective sensitivity to their shock. However, the modus operandi of the latest attack, apparently by a “lone wolf” – caref...

Cybersecurity and artificial intelligence key security themes at ASIS 2017

As the dust settles after ASIS 2017 in Dallas, most agree it was a good show. It was different in some respects from previous shows, but several of the changes seemed to work well. Launching the exhibition on Tuesday instead of Monday was a big hit, and who could fault the idea of happy hour drinks on the show floor? Attendance may not have broken records, but end user VIPs were among the crowd, and foot traffic held up fairly well, even on the final, shortened day. STANLEY Security virtual re...

Critical Network of Things: Why you must rethink your IoT security strategy

In a world where hacking and denial of service are everyday threats, many feel that it is about time for the world of the Internet of Things (IoT) to undergo a reality check over its strategy and promotion before disaster strikes, reputations are lost and investors pull up stakes and run for the hills.   What is new about IoT? Having made, lost and then re-made my fortune in and around the industry over the past 20-plus years, I cannot help but smile over the level of hype — an...

ASIS 2017 hot topics: Digitising building systems, cybersecurity and cloud services

End users at ASIS 2017 in Dallas may feel overwhelmed by all the new technology on display, but often their integrator partners can offer a helping hand. Traffic continued through much of Day 2 of the ASIS exhibition, but the foot traffic appeared to slow considerably as the day wore on. Convergint seeks closer manufacturer relationship Integrators are prominent at ASIS and play an important role connecting end user customers with manufacturers' products that meet their need. "We are taking t...

ASIS 2017 Day 1: Surveillance companies moving beyond integration

ASIS 2017 was off to a strong start on Tuesday, presenting a new wave of innovation to the U.S. security end user community. Many attendees to the Dallas show are well-placed in their companies to influence or direct the purchase of security products and equipment, and exhibitors sought to impress them with a range of new and enhanced options. Moving from integration to unification In general, the ASIS show has a quieter, less frantic feel than the spring ISC West show in Las Vegas. Conversat...

Why should a customer continue to buy “premium” surveillance cameras?

Remarkable changes are happening in the video camera market for surveillance applications, including the emergence of lower-priced products that offer features that previously were only available at a much higher price point. Deflating prices of cameras are sometimes referred to as a “race to the bottom” – foreshadowing a market of low-cost cameras that all provide similar features. We asked this week’s Expert Panel Roundtable to comment on camera pricing trends and how c...

MOBOTIX aims high with cybersecurity and customer-focused solutions

The last two years have been pivotal for MOBOTIX, the German IP surveillance manufacturer. In 2016, the company entered into a share transfer agreement with Konica Minolta, a provider of advanced imaging and sensor solutions. More recently, the company has welcomed new CEO Thomas Lausten, who joins MOBOTIX with a wealth of experience from companies including Siemens, ADI Global Distribution and Milestone Systems. The changes have been accompanied by an updated look for the MOBOTIX brand, wi...

How do you measure return on investment (ROI) in the security market?

Measuring return on investment (ROI) has long presented a challenge to the security marketplace. Investment in security is often viewed as a necessary cost whose benefits cannot be measured. For example, how do you measure the value of an event that doesn’t happen (i.e., that has been prevented)? The difficulty of measuring ROI doesn’t diminish customers’ appetite for it, however. Today’s choosy customers are driven more than ever by the bottom line and expect any and all...

The future of healthcare security: Violence response and emergency preparedness

There have been many changes in the healthcare environment over the past decade. The Affordable Care Act has been established, severe weather events are on the rise, violence along with active shootings continue to increase, behavioural health patients present treatment challenges and hospitals continue to consolidate to increase purchasing and service capabilities. Over the next decade, healthcare will continue to transform. Emphasis will be on financial reform, violence response, emergency pre...

How growing data sources are changing the surveillance industry

To say the surveillance industry has changed over the last quarter of a century is an understatement. From high-definition cameras and TVs to high flying drones and video analytics – the surveillance industry has shifted in ways we never expected to see in such a short space of time. What’s more, with such advancements in both quality and choice that’s now available in the market, it’s no wonder that revenue in the video surveillance market is set to double to $75.64 bill...

What are the security challenges for schools and colleges?

As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security...

How intelligent IP cameras enhance predictive analytics

For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today’s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts – an important component of predictive analys...

Download: Innovative edge storage solutions for the video surveillance industry

Edge storage technology - the recording of video and storing it at the camera or on a directly attached storage device instead of in a centralised recording facility across the network - is quickly gaining acceptance and is being more broadly adopted into IP video surveillance applications. The use of edge storage in an IP camera enables video surveillance solution developers more flexibility and cost benefits in system design. By leveraging local microSD card-based storage, system integrators...

Home security systems: Why you need to upgrade from 3G to 4G LTE technology

“Netflix,” “twerk” and “selfie” were added to the dictionary. Boston Marathon bombing. Activist Nelson Mandela and actor Paul Walker died. Edward Snowden gave NSA classified documents to Wikilinks. These events may seem like they happened only yesterday, but they are some of the top news headlines from four years ago. Four years can feel like a very short time, and in four short years, every security panel installed by dealers to date will go dark. The curren...

Does the security market really understand the meaning of 'cloud?'

There’s a huge cloud hanging over the physical security market, but in a good way. Cloud-based systems, whether for video, access control or another category, are on the verge of taking the industry by storm. The benefits of that mythical “cloud” are well-known, or certainly well-touted, in the market. It’s almost as if the word “cloud” has become a buzzword that can mean different things, or at least whatever the customer wants it to mean (as long as they buy...

From counter-terror to retail: Gaining actionable data from video surveillance

Nowadays, there is a lot of hype around data and its utility for almost any industry – from security and law enforcement to business operations and retail. While we are inundated with information about data and its significance to business success, technological development and fulfilling the promise of the Internet of Things, we don’t always get practical feedback as to how to obtain this valuable data from the resources available to us. Security teams feel this challenge acutely....

Body-worn cameras: Crime prevention tool, or threat to privacy?

Despite the increasing popularity of body-worn cameras, the technology has its detractors. For example, this month Big Brother Watch, a British civil liberties and privacy organisation, is raising new questions about the effectiveness of body-worn cameras. Specifically, Big Brother Watch found that 32 of the 45 police forces that have adopted body-cams in the United Kingdom were “unable to say” how often the footage was used in courts. To be clear, being “unable to say” d...

Getting to know Don Erickson, CEO of the Security Industry Association

Don Erickson grew up in Bellerose Village, New York and graduated from Catholic University. He has been the CEO of the Security Industry Association for five and a half years after serving as SIA’s government relations director. Erickson is responsible for managing the operations and programmes of SIA and implementation of the Board’s strategic plan. He has worked in the U.S. Senate and held government relations positions with Alcatel and an association of rural telecommunications ca...

How NERC/CIP compliance is boosting US power grid security

Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. Much of the current concern about securing electrical substations in the United States originated in response to a 2013 sniper attack, us...

How the cloud reduces physical security system costs

The corporate mantra “Utilise TCO instead of purchase price when making purchasing decisions” means evaluating a project’s Total-Cost-of-Ownership over its lifetime period as the primary cost factor. It requires the corporate buyer to scrutinise the entirety of the investment as opposed to just the upfront purchase price. Like an iceberg, where the majority of the ice is below the surface, the total cost of ownership of a security system is typically much larger than the upfro...

How is data changing the physical security market?

Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away w...

Related videos

Find Lost Wallet with Dahua WizSeek

Dahua Traffic Signal Controller Highlight

CLIQ Connect