MicroPower Technologies CCTV Network / IP Cameras(2)
SOLVEIL™ is a solar-powered, wireless surveillance solution unencumbered by the boundaries of traditional video security systems. The platform enables users to achieve high-resolution video coverage in perimeter and remote areas for enhanced security and operations monitoring. SOLVEIL is a powerful and highly reliable megapixel surveillance solution. SOLVEIL delivers reliable and secure video surveillance coverage in a compact form factor. Operating on a nominal 3/4 Watts, SOLVEIL is the most power-efficient megapixel surveillance camera available on today’s market. It captures and transmits live video up to a 1/2 mile away and provides reliable performance with high availability design. The platform supplies a minimum of five days of back-up power on a single charge of its integrated, long-life battery packs. SOLVEIL delivers ease of installation because of its integrated design, which allows users to redeploy the solution across remote and isolated sites. Its unique zero-cable design minimises deployment time, reduces installation complexity and limits business disruption because there is no need for trenching. SOLVEIL is available as a bundled solution and includes all the components necessary to quickly install and manage the system. It easily integrates with existing surveillance infrastructure and is compatible with today’s leading video and security management platforms. SOLVEIL incorporates robust security features to ensure security and video data is protected. Its robust wireless network protocol ensures high availability even in the event of network disruptions. SOLVEIL, powered by MicroPower, was founded on the idea that people and critical assets are often in remote or difficult to reach locations – securing and monitoring them should not be constrained by available infrastructure. Through innovative research and extensive development in a diverse set of security applications, MicroPower pioneered a comprehensive platform that reduces wireless camera power consumption by over 90 percent and eliminates the need for trenching. The solar technology is based upon a global NASA database of weather patterns over the past twenty years. MicroPower solutions are available through certified partners globally.Add to Compare
1/3 inch, Colour / Monochrome, 1MP resolution, Digital (DSP), Infrared, Auto Iris, Direct Drive, 2.8 ~ 11, Wide Dynamic Range, 1280 x 720, 30 fps, Back Light Compensation, Auto Gain Control, White Balance, 3 W, 448 x 143 x 137, 2,860, IP66, -40 ~ +50 C (-40 ~ +122 F)Add to Compare
Browse CCTV Network / IP Cameras
IP camera products updated recently
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organisation’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organisations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorised staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organisation will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organisation. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organisation’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organisations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorised person into a facility. Deploying video cameras, sensors Some organisations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimise throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorised persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customisable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customise devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarised, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analysing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyse massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyse massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognise residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorised person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From kindergarten to university Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognises outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customised solution Chubb Sicli’s quality, capability, and security expertise provided a customised solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
The customer Located in Brooklyn Park, Minnesota, North Hennepin Community College (NHCC) is one of the largest and most diverse community colleges in the state, serving more than 10,000 students enrolled in 60 degree and certificate programmes. With a rich tradition of excellence in teaching and learning, NHCC offers an exceptional student experience at one of the safest campuses in the country. NHCC’s all-inclusive public safety programme includes regular foot and vehicle patrol, set building alarms, access control and a campus-wide surveillance system. To further enhance student safety, NHCC has also installed MicroPower Technologies’ solar-powered, wireless MicroPower Surveillance Platform in its main parking lot for powerful, cost-effective and reliable 24x7 coverage. The challenge Campus safety is a top priority for college administrators, who are constantly looking for new ways to provide an open academic environment while ensuring student safety. With a far-reaching security plan already in place, North Hennepin Community College was left with one area that needed better coverage: the school’s parking lots. “We see a large amount of activity in our parking lots, ranging from vehicle break-ins and tampering to hit and run accidents, which we have not been able to effectively monitor with our existing cameras,” explained Erik Pakieser, Director of Public Safety at NHCC. “Staff, students and parents have asked for more coverage in these areas and we are committed to meeting their needs.” However, limited by budget, the college simply could not afford to install a surveillance system that would require trenching concrete to install electrical and network cables. In addition, the building that would have to support any additional hardwired cameras in the parking lots did not have an adequate power supply. “Every time we discussed parking lot surveillance, the conversation was over before it began because of the extraordinarily high costs of hardwiring,” added Pakieser. On the recommendation of Paragon, a single-source provider of converged IP/IT security solutions, NHCC selected the MicroPower Surveillance Platform to monitor activity across the South West Parking Lot, the campus’ main parking area. “We didn’t look at any other solutions,” asserted Pakieser. “MicroPower was the only wireless solution available that would allow us the cover such a large area without running network or power cables, and deliver video we required.” MicroPower solution NHCC installed 10 MicroPower video surveillance cameras mounted on 40-foot light poles throughout the parking lot. As an open-platform system, MicroPower is managed using the existing Milestone Video Management System for easy, central monitoring. “We couldn’t afford to invest in a separate client, so it was imperative that the new platform integrate seamlessly with the Milestone VMS,” noted Pakieser. “If not, it would’ve been a deal-breaker.” Public safety, human resource and maintenance personnel have access to the MicroPower platform, which is monitored in real-time by Public Safety officers. “Our officers like the MicroPower surveillance platform because they can see so much more than before and it is easy to manage using the familiar Milestone software,” said Pakieser. The MicroPower Surveillance Platform is used primarily for public safety reasons, but human sauces sometimes leverages footage to resolve employee issues or liability claims. “All feedback on the new systems has been very positive.” NHCC installed 10 MicroPower camerasthroughout the parking lot, which aremanaged using the existingMilestone Video Management System Paragon installed the MicroPower platform without difficulty, and all users were up and running with minimal training. “We upgraded the CMS to gain enhanced functionality with the MicroPower platform,” added Pakieser. “Now, we have access to more search and playback featured that let us better leverage the excellent surveillance footage we have of the parking lot.” Results According to Pakieser, the top selling feature of the MicroPower Surveillance Platform is the dramatic cost-savings it delivers. Its unique zero-cable design minimises deployment time, reduces installation complexity and does not require trenching. “There was simply no way we could’ve moved forward if we had to trench, so having a wireless option was a very, very big deal," stated Pakieser. A hardwired surveillance system would’ve cost thousands more, making it unfeasible. “A wireless solution was the difference between having parking lot surveillance and not.” The college has also seen a reduction in operational expenses since deploying the solar-powered MicroPower Surveillance Platform, which operates on only ¾ Watts and supplies a minimum of five days of back-up power on a single charge of its battery packs. “We can cut our electricity costs because we aren’t powering the cameras,” said Pakieser, who added that the college doesn’t have to worry about overloading its existing power supply either. “MicroPower helps with our budget and allows us to reduce our environmental footprint – a fact that has been well-received by the campus community.” Maintenance costs have also been lowered, due in part to the durability of the cameras. In fact, the college has experienced no downtime since they were installed. “The cameras also hold up well under the extreme weather conditions here in Minnesota,” said Pakieser. In fact, the system has required little to no maintenance so far. Public Service officers also save time because they no longer have to patrol the area on foot. “We can use the system in lieu of foot patrol, and quickly and easily review high-quality video to expedite investigations.” Pakieser also likes that MicroPower incorporates security features and a robust wireless network protocol to ensure that video data is protected and highly available, even in the event of network disruptions. “The IT team had no problem getting the platform running on the network and can easily support the system to ensure optimal uptime”. The MicroPower solution has changed the face of security at NHCC, providing remote, wireless surveillance where it was once impossible. “From a security standpoint, the MicroPower platform has been a huge help in our daily monitoring and investigating of parking lot incidents and a proactive step towards complete, campus-wide security,” concluded Pakieser. By providing high-quality video footage of the parking lot, the new system will also help reduce the potentially high costs of liability claims. “We are very happy with the performance, reliability and cost-effectiveness of the MicroPower Surveillance Platform and plan to install it across our other two working parking in the very near future”.
2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing. Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an even more hopeful view anticipating the year ahead. This article will provide a compilation of that variety of viewpoints with links to the individual articles. We appreciate all the contributions to our Review and Forecast initiative, and welcome any feedback. Nobody could have predicted the significant number of international security and terrorism threats this year, says one contributor. Undoubtedly this will result in even closer ties among the security industry, police and security services moving forward, as everyone looks to further enhance public safety. Combine physical and cyber security The nature of risk has changed, and there is a blurring of lines between cyber, physical and online security. These changes are spurring organisational changes as well. Concern over cyber-attacks via physical security networks grew in 2015, as more and more networked devices interact with security systems. The IT department continues to be a big buying influence as networked systems thrive. Developing IT-friendly solutions and communicating effectively to IT-focused buyers (whose needs can be slightly different than traditional security-focused buyers) is more important than ever. Cybersecurity concerns are likely to see a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task. There is a blurring of lines between cyber, physical and online security Needs: Personnel, ROI and good integrators Given the growing economy, one challenge is to find and retain top talent, especially in the North American business. One company pointed to the tight employment market that has made it difficult to fill several open positions needed because of growth. The tightening labour market has propelled to the forefront a pressing need for talent. There are fewer candidates for security officer openings – and openings in most industries. The competition for top talent is escalating. End users are also seeing change. The economy and economics demand that end user organisations direct their decision-making based on two very well-known terms, return on investment (ROI) and total cost of ownership (TCO). One unexpected development integrators began to see in 2015 is that they no longer have to be the lowest bidder to win a project. Customers are starting to see value in working with a knowledgeable and reputable systems integrator. Integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, security integrators are able to provide increased business intelligence across systems. One manufacturer says security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation. IT and networking professionals can install IP-based security systems, and there is a wide variety of cost-effective high-tech products available for every need. Interoperability will be the major trend of 2016 in the security industry. Initiatives like open standards and cooperation among suppliers are emerging to help companies react faster to changing security demands. The tight employment market has resulted in fewer candidates to fill security officer openings Video sector leading industry change The video sector displayed perhaps the most change in the physical security market in 2015. Perhaps there was some slim-down in scope and size of video projects this year, but one contributor certainly saw an upswing in new project installations. In 2015, the industry saw much more scrutiny placed on the quality of the video stream at display level. And new networked systems are meeting the demand. The end customer is expecting pristine, non-pixelated imagery. The affordable technology within the newest-generation of PCs and workstations from the CPU and graphics standpoint allow multiple views of high-definition camera activity. Other contributors agreed that video surveillance technology continues to evolve at a strong pace with improvements in resolution, integration, intelligence and bandwidth utilisation – all of which contribute to better overall security and cost-efficiency. There is also a broader variety of vertical markets showing an increasing need for video surveillance; security vendors must be versatile in their product offering. The products themselves must be highly scalable and must provide high performance at a competitive price. One-stop system or better integration? The tension continued in the market in 2015 between the need for effective integration of “best of breed” systems from a variety of manufacturers and a preference for a one-stop total system from a single manufacturer. Our contributors made good arguments for each. One company expects those with comprehensive solutions using embedded intelligence will dominate the business. This requires a dedicated focus on innovation in intelligent solutions rather than specific products, they say. “2016 will involve not only digitising the physical world, but also in understanding it with applications that go beyond the realm of security into business intelligence to generate actionable insights. This is the way of the future.” The cost of megapixel cameras has dropped dramatically as this functionality is now available on chips Another contributor sees a continuing and growing need to support heterogeneous systems that may include multiple brands of cameras and other devices, driven in part by the fast pace of new model introductions. Prediction: This trend will continue, and could even increase, through 2016. The industry also experienced more price pressure on hardware than in previous years. The discussion of price versus value will be a common one in 2016. There can only be one player with the lowest cost, but there is a part of the market focused just on cost. However, many companies will keep building on value and quality. The “siliconisation” of surveillance cameras has had a great impact on the security industry, especially this year. The cost of complex megapixel cameras has decreased dramatically as this functionality is now available on chips. The camera industry has gone from innovating on the camera’s performance and functionality to acting more like the PC OEM business, and this siliconisation is driving industry commoditisation. Smarter systems coming fast More intelligent systems offer plenty of opportunity for the market. The inclusion of high-quality analytics on board the camera, says one company, will be a continuing trend in 2016 and beyond. 2015 saw an accelerated adoption of thermal cameras with video analytics. Several contributors predict that the adoption of video analytics will continue to grow. There will be more enterprise-level and mission-critical installations where analytics are specified into the system. The technology will also trickle down into everyday installations, like larger retail stores, schools and offices. Indeed, video analytics are experiencing a renaissance, with even more applications of analytics likely in 2016. Another contributor predicts that increasingly accurate camera- and server-based analytics applications, available in 2016, can provide valuable data and insights for business operations, management and more. 4K cameras will likely continue to dominate new offerings in 2016. However, one contributor points out that 4K surveillance faces diverse technical challenges. Every element in the video surveillance collection chain — lenses, sensors, image processors, local-site transport (LST), monitors, codecs, HDDs, and WAN interfaces — must be “ready for prime time” in order for the mainstream market to migrate to the higher resolution. Every element in the video surveillance collection chain - from lenses to image processors - must be ready for the migration to 4K resolution However, analogue is still dominant in parts of the market with some still reluctant to make the move to HD and IP. However, 2016 will see a new generation of high-performance IP camera (4K) become established in the market. Cyber-security is another concern in the video market, as well as the physical security market in general. More attention is being paid to IT security because of high-profile cyber-attacks and data theft incidents, accelerating the adoption of IT security standards by system manufacturers and integrators. Wireless and other trends Wireless connectivity is a coming trend. A cost-effective solution is to upgrade network connectivity with a novel breed of wireless technology, millimetre wave (mmWave), which is the next unlicensed band. One participant attributes their success to not following trends. They favour an approach of questioning conventional wisdom and placing the greatest emphasis on customer benefits. They see themselves not as a manufacturer but as a provider of solutions that provides added value for the customer. It seems that regardless of the economic gains or losses over any given period of time, video surveillance continues to grow at a good to great clip. The demand for surveillance is always there, and the request from the end users and channels are always the same – great technology at a fair total cost, that allows them to run their business more efficiently, effectively and safely. The appearance of numerous mobile credential offerings signals the "beginning of the end" for card-based identity Access control, biometrics, and beyond News in the marketplace in 2015 included the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. 2016 will see an acceleration in the broad adoption of fingerprint solutions for corporate security applications. The market is maturing and producing reliable, effective and secure solutions that specifically address the issues that caused concern in previous years such as dirty fingers or spoofing attempts. One contributor sees a growing awareness in the C-suite of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action. How customers interface with solution providers is changing. One (cloud-based) company seeks to become “strategic partners” – to become “part of [the] customers’ overall planning and embedded in their organisation.” In effect, they are looking to add value every day. Market research is showing that IP access control is gaining significant strength and growing at rates that the IP surveillance world experienced for the last 8 -10 years. End user organisations continue to contain costs any way they can and have an interest in being as green as possible. The changing world of credentialing The world of credentialing in the access control market is changing rapidly. The appearance of numerous mobile credential offerings signals the “beginning of the end” of card-based identity. Mobile offerings are strengthening in general. In fact, “invisible” access credentials are coming into their own, thanks in large part to technologies that enable smartphones to be used as electronic keys for locking and unlocking doors. Customers increasingly expect similar types of experiences where they live, learn and work, which is impacting how they interface with their company’s systems. The transition to electronic credentials is increasing as a result of more awareness of credential options and tangible improvements in operating efficiency. Security will move to a much greater focus on the user experience. The rising drone threat is pushing the development of low-cost radar and other solutions for detection and interception In contrast, the increase in school shootings and other emergency situations in 2015 has made ID badging top-of-mind for facilities throughout the country, says one contributor. Instead of upgrading or replacing hardware, end users in many cases will be able to upgrade the software to have new features, even related to systems like key control. In general, key control is gaining mindshare. Whereas previously key management systems and lockers for asset management were seen as a periphery issue, facilities and security managers are now starting to see them as a vital part of the overall security strategy. There are other trends, too. The rising drone threat will bolster development of low-cost radar and other solutions. However, the industry will still need to resolve the issue of safe and effective interception. In fact, drones are only one of the futuristic trends likely to impact the market in 2015. The Middle East is a particular hotbed for vehicle barriers and other increased security measures for explosive-laden vehicles. One company focuses on providing real-time information to security personnel and first responders to help them identify, respond and mitigate emergency situations. Looking ahead to 2016 In the new year, look for predictive security to be a more prevalent theme as organisations are tasked with not only providing more data but making sense of the data for use in improving security operations. Also, digitalisation for consumers (social media, tech offerings from financial companies and wireless service providers) are helping to drive IP conversion in the security industry: the advantages people have at home are desired at work, too. We should expect that more of the large technology giants known outside of our industry will enter the professional security market, predicts another contributor, as the trend towards networking and more advanced integration continues to gain traction. See the full coverage of 2015/2016 Review and Forecast articles here
Video surveillance technologies such as solar and wireless security which are cost-effective and sustainable have witnessed increased adoption. Innovative end-user focused security companies will flourish in the coming years as new market verticals are looking to address security issues. Evolution of surveillance Looking back over the past year, it is easy to see how the security industry has continued to realise substantial gains. Some of these gains have been financial, some have been brought on by consolidation, and others have been delivered through the promise of interoperability. Most importantly, we've also seen users benefitting from the growing adoption of emerging technologies across a wide variety of business sectors. The next evolution of the surveillance market is around the corner. The economy and economics demand that organisations use decision-making that focuses on two very well-known terms, return on investment (ROI) and total cost of ownership (TCO). Security and surveillance departments compete with other disciplines for a piece of an organisation’s budget and, therefore, have to focus on generating positive returns. Fortunately, surveillance investments are able to deliver a significant amount of value in helping protect people and infrastructure, and users have also found ways to enhance the value of these solutions for uses beyond the security sector. Security in education sector But there are vertical markets, such as education for example, that face a real-world need to protect from the threat of violence. Although security-based decisions in the education space are often driven by strong emotional response, budgets are still a significant factor. At MicroPower, we are committed to helping schools stay vigilant. In December, we will announce a school security grant programme, designed to help schools build a proactive perimeter security programme. This grant program is part of our effort to give back to the industry and help ensure K-12 schools can deploy the technologies necessary to protect against threats. MicroPower are committed to helping schools build a proactive perimeter security programme Physical security across markets 2015 has also been an interesting year for the critical infrastructure and logistics markets. These environments recognise a long-overdue need to address risks to the perimeter, and ingress and egress points. Surveillance technology not only helps secure these sites, it can be used to monitor traffic and operations, adding more value to the organisation. But whether these markets continue to be robust remains to be seen. The fluctuation in the price of oil changes the perspective, and we will be observing how these prices will affect the market in 2016. New security trends and technologies In the New Year, we can expect to see a number of building trends. The rise in the adoption of technologies that have been proven in other markets, such as solar and wireless, will continue. In the security sector, such advanced systems can help reduce costs dramatically. The continued commoditisation of video surveillance cameras will also continue to revolutionise the market over the next year. Companies that end up on top will do so by differentiating with meaningful benefits, and organisations that focus exclusively on price will prove to be unsuccessful. MicroPower Technologies was well received in the marketplace in 2015, and was fortunate to be honoured with multiple industry awards for innovations in video surveillance. Our organisation’s business results are now defined by multiples as opposed to the previous year, and we look forward to keeping up the momentum we gained in 2015. The security market is a sound and sustainable business for innovative companies that can effectively address the risks and issues facing end users. At year-end and looking ahead, there is much potential yet to be realised in use cases for surveillance technologies that leverage sustainable, cost-effective energy and communication solutions to drive new levels of security and efficiency for the end user. See the full coverage of 2015/2016 Review and Forecast articles here
The security behind financial securityDownload
Nine ways to make your retail security system work harderDownload
Financial institutions require future-ready physical security technologiesDownload
Dahua Technology’s Safe City Solution chosen by the local government to make Brienon-sur-Armançon safer
- Dahua Technology secures Astana’s BI-City Tokyo residential complex with Smart Residential Solution
- Dahua Technology’s Safe City Solution chosen by the local government to make Brienon-sur-Armançon safer
- Prescott Valley’s Ocean Blue Car Wash installs 3xLOGIC video surveillance system for enhanced security
- Matrix Comsec provides central monitoring solutions and secures Nashik railway station during Kumbh Mela