Illustra CCTV Network / IP Cameras(15)
Tyco Security Products, part of Tyco, the world’s largest pure-play fire protection and security company, announces a new range of IP cameras and NVRs that meets the budget of small to medium sized businesses, while satisfying their need for high-quality video surveillance. Illustra Essentials, which features 1 and 2MP resolution variants, including bullet cameras and mini-domes with IR LEDs and an indoor mini-dome option, is the latest addition to Tyco’s extensive Illustra camera portfolio, All Essentials versions offer H.264 and MJPEG dual-stream, a 3.6mm fixed lens, 30 images per second at 1080p or 720p for crisp, clear images and IR illumination up to 20m. The Essentials outdoor mini-dome and bullet cameras are equipped with IR illuminators, true day/night filter and wide dynamic range to capture quality video in a variety of indoor and outdoor settings. The wide dynamic range capabilities of the Essentials indoor mini-dome also captures video in challenging lighting conditions, making it ideal for a range of indoor applications. The second part of the low-cost IP surveillance equation, is Tyco Security Products’ new Holis range of 4 and 8 channel NVRs featuring 1080p resolution, video search and export functions. With PoE support on all ports, a start-up wizard that includes automatic camera discovery, and simple installation, Holis NVRs greatly reduce the total cost of ownership and minimise labour costs and time on site. The Holis range have been specifically designed to support small camera count installations in an economical and efficient manner, such as independent retailers, small offices and restaurants, providing the dependable recording solution they rely upon. “There’s a growing segment within the commercial community, ranging from corner shops to doctors’ surgeries, that want to embrace security for their premises, but they need products that are inherently trustworthy, easy to operate and budget friendly,” said Julian Inman, Product Marketing Manager, Video, EMEA, Tyco Security Products. “With the affordable addition to the Illustra IP camera portfolio and new Holis NVRs, we’ve struck the right balance between high-quality features and a truly affordable price.”Add to Compare
1/3 inch, True Day / Night, 2 MP resolution, Digital (DSP), Network, 0 lux, 12 V DC, PoE, 3.6, Wide Dynamic Range, 1920 x 1080, 30 ips, Back Light Compensation, Auto Gain Control, White Balance, 1/3(4) ~ 1/10000s, > 50, Mini or Compact, H.264/MJPEG, RJ-45 (10/100Base-T), IPv4/IPv6, HTTP, HTTPS, SSL, TCP/IP, UDP, UPnP, ICMP, IGMP, RTSP, RTP, SMTP, NTP, DHCP, DNS, PPPOE, DDNS, FTP, IP Filter, QoS, Bonjour, 6 W, 70 x 66 x 155, 620, IP66, -30 ~ +60 C (-22 ~ +140 F)Add to Compare
Solid yet affordable, the Illustra Flex Bullet Camera is a True Day/Night network camera that provides 1MP or 3MP full HD resolution for high quality images. H.264video compression provides excellent image clarity and efficient bandwidth and video storage for a cost-effective video solution. Featuring a tough exterior, the Illustra ADCi800F-B521 Bullet Camera is ideal for exterior applications of small to medium size offices, retail boutiques, K-12 schools and small bank branches looking for a rugged camera that can withstand harsh environments. The integrated 9-22mm varifocal lens delivers an excellent field of view over longer distances providing the video resolution needed for most outdoor installations. With a sleek IP66-rated enclosure to protect against dust and water damage, this camera is perfect for parking lots and garages, loading docks and any exterior entrances where it is exposed to the elements. The Illustra Flex Bullet Camera comes complete with built-in IR illuminators for clear video images at up to 82 feet for extreme low light or zero illumination conditions providing crisp, clear video quality both day and night. And, with an integrated mount, installation is a breeze. Illustra ADCi800F-B521 IP bullet camera features: 1MP or 3MP resolution for true HD quality images 9-22mm varifocal megapixel lens True Day/Night (TDN) functionality for a true colour image 3D noise reduction for sharper images and lower bandwidth use in low light IR illuminators for clear images in low light conditions Motion detection for instant alerts of intruders IP66-rated enclosure to protect against dust and water damage Integrated mount for quick and easy installation ONVIF 2.2 profile S compliantAdd to Compare
1/3 inch, 5 MP resolution, Digital (DSP), Megapixel, 1.2 lux, Direct Drive, PoE, Motion Activated, 1.37, Wall / Ceiling, Wide Dynamic Range, 1936 x 1936, 14 ips, White Balance, Zoom, H.264 / MJPEG, 10/100Base-T, TCP/IP, IPv4, IPv6, TCP, UDP, HTTP, FTP, DHCP, WS-Discovery, DNS, DDNS, RTP, TLS, Unicast, Multicast, NTP, SMTP, WS-Security, < 12.95 W, 750, -10 ~ +45 C (14 ~ 113 F)Add to Compare
5 MP resolution, Digital (DSP), Megapixel, 1.2 lux, PoE, Motion Activated, 1.37, Wide Dynamic Range, 1936 x 1936, 14 ips, White Balance, Zoom, H.264 / MJPEG, 10/100Base-T, TCP/IP, IPv4, IPv6, TCP, UDP, HTTP, FTP, DHCP, WS-Discovery, DNS, DDNS, RTP, TLS, Unicast, Multicast, NTP, SMTP, WS-Security, < 12.95 W, 730, -10 ~ +45 C (14 ~ 113 F)Add to Compare
1/3 inch, True Day / Night, 2 MP resolution, Digital (DSP), Infrared, 0 lux, 12 V DC, Motion Activated, 4.3, Wide Dynamic Range, 1920 x 1080, 30 ips, Mini or Compact, Zoom, H.264, MJPEG, PTZ, 4.44 W, 73 x 76 x 245, IP66, IK10, -20 ~ +50 C (-4 ~ +122 F), HDAdd to Compare
1/3 inch, True Day / Night, 2.1 MP resolution, Digital (DSP), Infrared, 0 lux, PoE , Motion Activated, 3 ~ 9, 1920 x 1080, PAL, NTSC, 1.0 Vp-p, 75 ohm, H.264, MJPEG, Ethernet 10/100Base-T, TCP/IP, DHCP, HTTP, ICMP, UPnP, ARP, DNS, DDNS, PPPoE, SMTP, FTP, RTSP, 8.4 W, 97 x 236, 1,900, IP66, -40 ~ +50 C (-40 ~ +122 F), MS IE 8.x or greaterAdd to Compare
1/3 inch, True Day / Night, 2.1 MP resolution, Digital (DSP), Megapixel, 0.01 lux, Auto Iris, Direct Drive, C/CS mount, 24 V AC, Motion Activated, Wide Dynamic Range, 1.0 Vp-p, 75 ohm, composite, H.264 / MJPEG, Ethernet 10/100Base-T, TCP/IP, DHCP, HTTP, ICMP, UPnP, ARP, DNS, DDNS, PPPoE, SMTP, FTP, RTSP, 6 W, 56 x 68 x 115, 360, 0 ~ 50 C (32 ~ 122F), HDAdd to Compare
1/3 inch, True Day / Night, 2 MP resolution, Digital (DSP), Megapixel, 1.0 lux, 12 V DC, Motion Activated, 4.3 mm, Wide Dynamic Range, 1920 x 1080, 30 ips, Mini or Compact, H.264 / MJPEG, 10/100Base-T, 4.44 W, 74 x 76 x 245, 600, -20 ~ +45 C (-4 ~ +113 F), 85Add to Compare
1/3 inch, True Day / Night, 2.1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, Auto Iris, 24 V AC, Motion Activated, 3.3 ~ 2 mm, Wide Dynamic Range, 1920 x 1080, 30 ips, Mini or Compact, Zoom, H.264 / MJPEG, Ethernet 10/100Base-T, TCP/IP, DHCP, HTTP, ICMP, UPnP, ARP, DNS, DDNS, PPPoE, SMTP, FTP, RTSP, 10.5 W, 97 x 236, 1,900, IP66, -40 ~ +50 C (-40 ~ +122 F), MS IE 8.x or greater, HDAdd to Compare
1/3 inch, True Day / Night, 1 MP resolution, Digital (DSP), Megapixel, 0.1 lux, CS mount, 24 V AC, Motion Activated, Wide Dynamic Range, 1280 x 720, 30 ips, Inclusion DVR/ Web Server, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, Mini or Compact, H.264 / MJPEG, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 6.8 W, 600, 56 x 125 x 69, -10 ~ +40 C (14 ~ 104 F), 10 ~ 90Add to Compare
1/3 inch, True Day / Night, 3 MP resolution, Digital (DSP), Megapixel, 0.1 lux, CS mount, 24 V AC, Motion Activated, Wide Dynamic Range, 2304 x 1296, 15 ips, Inclusion DVR/ Web Server, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, Mini or Compact, Zoom, H.264 / MJPEG, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 7 W, 600, 56 x 125 x 69, IP66, -10 ~ +40 C (14 ~ 104 F), 10 ~ 90, HDAdd to Compare
1/3 inch, True Day / Night, 1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 24 V AC, Motion Activated, 9 ~ 22 mm, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 15 W, 2,300, 115 x 264, IP66, -40 ~ +50 C (-40 ~ +122 F), Internet Explorer 8.0 or above, HDAdd to Compare
1/4 inch, 1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 5 V DC, Motion Activated, 3.6 mm, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, UPnP, SMTP, 4 W, 89 x 81 x 250, 750, -10 ~ +40 C (14 ~ 104 F), Internet Explorer 8.0 or above, 0 ~ 90, HDAdd to Compare
1/4 inch, Colour / Monochrome, 1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 5 V DC, Motion Activated, 3.6 mm, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 4 W, 89 x 81 x 250, 750, -10 ~ +40 C (14 ~ 104 F), 0 ~ 90, HDAdd to Compare
Browse CCTV Network / IP Cameras
IP camera products updated recently
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. Video surveillance technology provides added security for you, your family and your business In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant through these odd times and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorisation and the appropriate credentials. But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customised and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail Within the retail industry, autonomous, cashier-less stores are already growing in popularity The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms power continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
Large event venues spend significant resources on physical security, and the vast majority invest in video surveillance systems as a way of monitoring public areas such as parking lots, garages and seating, as well as “backstage” areas such as loading docks and offices. Even though the camera footage is often preserved for investigating incidents, for the most part, video footage goes untapped because – realistically – security staff cannot constantly and efficiently monitor cameras in real-time or review the high volumes of archived video. Video analytics powered by Artificial Intelligence Increasingly, event venues are overcoming this challenge and maximising this video data by investing in intelligent video surveillance. In this article, I will explore how the combination of traditional surveillance and groundbreaking video content analytics enables event venues to not only optimise physical security and safety, but also improve customer service, streamline operations, and gather valuable business intelligence. Deep learning and artificial intelligence-based video content analytic systems detect, identify, extract, and catalog all the objects that appear in video footage based on classes and attributes such as gender, appearance similarity, color or size. This – along with behavioral detection, such as object interactions, dwell times, and navigation paths, as well as face and license plate recognition – enables searchable, actionable and quantifiable analysis of video. The technology makes it easy for users to accelerate post-event investigations, improve situational awareness, and derive critical business insights from video data. Accelerate post-event investigations, improve situational awareness, and derive critical business insights Accelerating investigations Where there are crowds, it’s not uncommon for medical or criminal incidents to transpire. In the aftermath, security teams must quickly understand the scene and, by making video searchable, video analytics helps them efficiently gather information or evidence from multiple camera. Whereas a manual search of video footage would require hours, if not days, of valuable time and staff resources – while being subject to human error – a video content analytics system enables effective multi-video search using a variety of filters, so that post-incident investigations can be focused and, thereby, accelerated. For instance, if witnesses claim that a man in a yellow shirt caused a disturbance and then drove away in a blue pickup truck, security could filter video to review instances where people or vehicles matching those descriptions appeared, and then focus their investigation on relevant video evidence. For the same example, if the perpetrator was still at large in the venue, security managers would want to track the person’s movements and, ultimately, apprehend him. Using the same cataloged metadata that drives video search, intelligent video surveillance accelerates real-time response to developing situations from threats and suspicious behaviors to emergencies, or even any behavior that requires closer monitoring or intervention. Something as mundane as an unwieldy queue forming at a concession stand can alert logic that increases operators’ situational awareness and ability to effectively intervene. By understanding developing situations in real-time, they can respond more quickly to prevent or solve a problem. Rule-based real time alerts Users can configure rule-based real-time alerts, based on specific scenarios – such as when people counts in the defined space next to the cashier are higher than the specified threshold, indicating a queue, or when vehicles are detected dwelling in a no-park zone or sensitive security area. In the case of the offender in the yellow shirt, security could configure alerts to notify for appearances of men in yellow shirts or blue pickup trucks within the event complex. If they’re able to extract the perpetrator’s face or license plate from the video search, security officers can also identify and track the specific person and vehicle of interest. Intelligent video surveillance users can compile “watchlists” Object recognition is helpful for tracking specific, identified threats, but it can also be leveraged for locating missing persons or vehicles or offering VIP services to guests who comply. Intelligent video surveillance users can compile “watchlists” – that include persons of interest, such as past agitators, recognised criminals or terrorists, missing persons or VIPs – to be alerted when matches for these faces appear in video. Face recognition can also be used to differentiate recognised employees from visitors that are not authorised to be in certain spaces in order to prevent security breaches. Because camera conditions aren’t always optimal for “in the wild” face and license plate recognition – where lighting conditions or camera angles don’t always allow for a pristine face or plate capture – it is critical to have a comprehensive video content analysis tool for triggering alerts based object classifications and non-personally-identifiable parameters. Optimising operations based on business intelligence While having real-time situational awareness is crucial for proactive intervention to developing situations, understanding long-term activity and trends can be equally important for an events venue or stadium. With video analytics, video surveillance data can be aggregated over time to generate statistical intelligence, trend reports, and data visualisations for operational intelligence. This capability transforms video surveillance from a siloed security tool to an intelligence platform with broad value for business groups across the organisation. Marketing departments can gain visitor demographic information for targeted advertising and product placements. On-site retailers can uncover how visitors navigate their stores and the products or spaces that draw the most attention. Property management can follow heatmaps demonstrating where visitors dwell and the durations they stay at certain exhibits or areas, to base rental and leasing fees on actionable and quantifiable intelligence. Operations managers can more effectively plan and hire staff for events, by analysing visitor traffic trends, entry and exit points and occupancy statistics. Video surveillance data can be aggregated over time to generate statistical intelligence For these reasons and more, event organisations that already rely on CCTV networks should consider how to better leverage those existing investments to deliver substantial value across the organisation. By making video searchable, actionable and quantifiable, intelligent video surveillance empowers event managers to enhance public safety and physical security, while also streamlining operations and improving customer service.
Johnson Controls introduces the Tyco HD Encoder, an ideal solution that allows high definition (HD) and standard definition (SD) analogue cameras to function within an evolving IP infrastructure. The product is supported by both exacqVision, American Dynamics and VideoEdge. IP video surveillance Available in one-and four-channel options, the Tyco HD Encoder allows users in networked environments to retain HD and SD cameras while adding IP cameras over time, leveraging the benefits of IP while utilising their existing analogue infrastructure. Encoder hardware adapts analogue video to be sent over IP networks, helping CCTV systems upgrade to a modern IP video surveillance organisation. The HD Encoder is ready for deployment out-of-the-box and is Power over Ethernet enabled for minimal cabling by running power and data through the same CAT5/6 cable. The encoder also includes important features like HDMI out, H.264 compression for cameras up to 2MP, multi-streaming and support for AHD, CVI and TVI analogue protocols. Fully integrated video system Tyco provides network video recorders and video management systems from American Dynamics and Exacq, offering the foundation for a fully integrated video system. Purchasing each aspect of the solution from the same vendor reduces potential product lifetime issues while streamlining setup and support.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
Related white papers
How to overcome the storage challenges of adopting surveillance AI
Five things to consider for AI with video technology
How to get buy-in from IT departments on IP video installations
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload
Optex iSeries battery-powered wireless detectors enhance construction site security by countering thefts
- Hikvision and ADJ Fire and Security provide thermal imaging technology at Recycling Lives
- Optex iSeries battery-powered wireless detectors enhance construction site security by countering thefts
- Salient Systems provides best of breed security systems to launch Bexar County Metro’s Emergency Operations Centre
- Optex secures an aviation fuel farm with Redscan laser detectors to enhance monitoring solution