AMAG CCTV Network / IP Cameras(9)
1/3 inch, Colour / Monochrome, 2 MP resolution, Digital (DSP), 0.001 lux, 24 V AC, PTZ, Motion Activated, 4.45 ~ 89, Wide Dynamic Range, 1920 x 1080, 30 fps, Back Light Compensation, 1/1 ~ 1/10,000 s, > 50, Mini or Compact, Zoom, BNC Connector, H.264, MJPEG, PTZ, 21 W, 2,100, 180 x 240, 0 ~ 50 C (32 ~ 122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), 0.001 lux, Auto Iris, 12 V DC, 24 V AC, Network, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Zoom, H.264, MJPEG, PTZ, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 800 mA, 1,200, 165 x 135 x 100, 0 ~ 45 C (32 ~ 113 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), 0.001 lux, Auto Iris, 12 V DC, Network, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 460 mA, 520, 144 x 121 x 100, 0 ~ 50 C (32 ~ 122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), 0.001 lux, 12 V DC, Network, Motion Activated, 3.1 ~ 8, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 350 mA, 500, 71 x 64 x 140, 0 ~ 50 C (32 ~ 122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), 0 lux, Auto Iris, 12 V DC, Infrared, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 1.5 A, 1,500, 83 x 82 x 194, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), 0 lux, Auto Iris, 12 V DC, Infrared, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, SOCK, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 21.6 W, 1,200, 155 x 129 x 100, IP66, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 85, HDAdd to Compare
1/4 inch, Colour / Monochrome, 1280 x 720 resolution, Digital (DSP), 0.1 lux, Auto Iris, 12 V DC, Network, Motion Activated, 2.7, 1280 x 720, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SSH, SNMP v2/v3, 400 mA, 142, 64 x 108 x 40, 0 ~ 40 C (32 ~ 104 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), 0.001 lux, Auto Iris, 12 V DC, 24 V AC, Network, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, PTZ, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 1.5 A, 1,200, 154 x 130 x 100, IP66, -20 ~ +50 C (-4 ~ +122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 2 MP resolution, Digital (DSP), 0.001 lux, 24 V AC, PTZ, Motion Activated, 4.45 ~ 89, Wide Dynamic Range, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, 1/1 ~ 1/10,000 s, > 50, Zoom, BNC Connector, H.264, MPEG, PTZ, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SSH, SNMP v2/v3, 53 W, 4,600, 248 x 309, IP66, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 85, HDAdd to Compare
Browse CCTV Network / IP Cameras
IP camera products updated recently
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasising the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official turnstile sponsor of the show. Appropriate entrance solution Security entrances coupled with access technologies provide a complete solution Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with the appropriate entrance solution. Swinging doors do not stop one authorised person from opening the door and then holding it open for a number of others. Security entrances coupled with access technologies provide a complete solution that ensures only one person can enter per valid authorisation. The following solutions will be on display in Boon Edam’s booth: Lifeline Speedlane Swing Optical Turnstile: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave™ touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. New! Lifeline Boost Access Control Pedestal: The Boost is a brand new, stylish access control pedestal designed by Boon Edam to complement the popular Lifeline optical turnstile series. The Boost will include the latest version of Essex’s credential card reader, now with optical Bluetooth and OSDP capability, the iRox-T with BLE expands for HID Global’s Mobile Access solutions. Tourlock 180+90 Security Revolving Door: The entrance of choice for the Fortune 500, the Tourlock will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock Mantrap Portal: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorisation, while facial recognition provides instant authentication inside the portal. The secure, edge-based facial recognition access control device by Alcatraz, called the Rock, can also be experienced at their booth (GSX booth #1047). BoonConnect Software: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Upcoming tailgating season Boon Edam is celebrating its position as the market pioneer for security entrances, according to a report by IHS Markit®, with a tailgating-themed prize giveaway. All visitors to GSX are invited to participate by visiting booth #1103 during show hours. Participants will have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg® grill, a YETI® cooler and more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email by Friday, September 27.
AMAG Technology, global provider of unified solutions that help organisations mitigate risk, introduces its Symmetry GUEST visitor management family of interactive touch screen kiosks. Symmetry GUEST kiosks Symmetry GUEST improves the visitor experience by automating all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area, enforcing compliance and reducing operating costs. Eliminate paper logbooks and create an audit trail to properly manage visitors. Kiosk setup is fast and easy as the software and hardware come pre-installed. “End users will find Symmetry GUEST Kiosks improve visitor traffic flow and are a sleek and innovative addition to their lobbies, improving first impressions while mitigating risk,” said AMAG Technology, Sr. Product Manager, Jim Murray. Visitor management system Countertop style kiosks provide options for either unfixed or fixed mounting The Symmetry GUEST Kiosks come in three main designs (Countertop, Slim Wall Mount and Freestanding) and two colors (white or black) with custom branding options to best meet your visitor check-in requirements and lobby décor. Countertop style kiosks provide options for either unfixed (portable) or fixed (secure) mounting to a receptionist desk or check-in counter for easy access. Slim Wall Mount kiosks mount flush to the wall or glass and are perfect for small lobbies or large, such as busy areas where multiple units are needed to efficiently check-in a high volume of visitors. Freestanding kiosks come with or without cabinet and printer. Custom branding options are available for all Symmetry GUEST Kiosks enabling organisations to place their visitor check-in messaging and logo on the kiosk for increased visitor engagement. AMAG Technology’s Symmetry security management solutions are deployed across a wide variety of market segments from commercial to government, education, healthcare, banking, transportation, utilities, plus many more.
The Physical Security Interoperability Alliance (PSIA) was founded in 2008 with a goal of creating ‘plug-and-play interoperability’ among physical security devices, systems and services. Since then, the organisation’s mission has both expanded to include logical security and focused more narrowly on identity, a critical aspect of security today. In recent years, PSIA has concentrated on its PLAI (Physical Logical Access Interoperability) specification, which provides a means to enable disparate physical access control systems (PACS) to communicate to each other and share employee identity data. This is especially important for companies who have made acquisitions and inherited different incompatible PACS systems. “PLAI can unify a security environment through one trusted source, even if there are multiple PACS systems,” says David Bunzel, Executive Director of the Physical Security Interoperability Alliance (PSIA). Bridge between disparate PACS The PLAI specification provides a bridge between disparate PACS, allowing a single trusted source for identity management. Leading PACS vendors including JCI (Software House), Lenel, and Kastle Systems and biometric vendors including Eyelock, Idemia, and Princeton Identity, have each implemented PLAI adapters, supporting this specification. AMAG will have their adapter in the coming months, and Honeywell and Siemens have it on their road maps. At ISC West last April, PSIA was able to demonstrate five of these vendors sharing records and the ability to add and terminate an employee and have it updated across each PACS and biometric system. PSIA was able to demonstrate five of these vendors sharing records at ISC West last April The Physical Security Interoperability Alliance (PSIA) has evolved from supporting physical security to also integrating logical security. Access to facilities and secure areas of buildings is increasingly dependent on software and hardware systems which can validate a person’s identity. “The PSIA has chosen to focus on interoperability between identity management systems and access control devices,” says Bunzel. “We have successfully demonstrated the technology, and it is now being specified by consultants, integrators and enterprise customers in actual security systems. We expect to see some large companies announcing PLAI implementations in the next quarter.” Open standards processes PSIA relies on an open standards process, with collaboration among leaders in the various parts of the security industry. Specifications are architected, discussed, drafted, and reviewed by members of the organisation in technical committees. The process is dynamic, with periodic updates added, which will improve and enhance the specifications as appropriate. The PSIA has focused on identity management for enterprise customers, says Bunzel. “We have active members who make devices that support access hardware (for example, locks and biometric systems) who by design complement PACS vendors and HR management systems.” PLAI also enables a variety of services for enterprise customers that may rely on a security credential" “We continue to add more PACS and biometrics vendors to the PLAI ecosystem, expanding the value of the specification in the market,” says Bunzel. “PLAI also enables a variety of services for enterprise customers that may rely on a security credential, including printing services, parking, and facility management. In the near future, the PSIA expects to extend PLAI into elevators. There are other identity management capabilities, and the PSIA will evaluate opportunities as the market demands them,” says Bunzel. In addition to PLAI, PSIA has several ‘legacy’ specs, but they are not actively working on further iterations. PSIA could always consider new development on legacy specs if the market demanded it. Some legacy specs address video, and security cameras often work with access control systems. However, PSIA currently is leaving video to ONVIF. The near-term direction and plan for the PSIA is to focus on PLAI and its commercialisation.
Physical security supports a future-proof cyber security strategyDownload
Combining systems intelligence and human insight for superior securityDownload
Three reasons for adopting open architecture access control solutionsDownload
- March Networks provides video surveillance solutions at Leon Medical Centers
- Dahua Technology’s surveillance system secures Yarmouth Harbour from thefts
- Airbus’ STYRIS, Vessel Traffic Services upgrades the Port of Sydney
- 360 Vision Technology’s Invictus Hybrid PTZ cameras deployed at Security Centers International’s Mobile Advanced Safety Tower (MAST)