QNAP to introduce IP video surveillance systems with high-definition local display at ASIS International 2010
QNAP to introduce IP video surveillance systems with high-definition local display at ASIS International 2010

QNAP Security, a world class manufacturer of PC-less Network Video Recorder (NVR) solutions is pleased to announce its participation in ASIS International 2010, the US. QNAP Security will introduce the latest 2/4/6-drive VioStor Pro NVR Series, the powerful IP video surveillance systems featuring high-definition local display for PC-less configuration, monitoring, and playback via a VGA connector. VioStor Pro NVR Series is an ideal surveillance solution for all sorts of security-conscious environments. It supports up to 120-channel monitoring, high quality H.264, MPEG4, M-JPEG, and MxPEG recording, maximum 12TB storage (6-bay model), and comprehensive event management tools. The new NVR Series incorporates a dual-core Intel® Atom™ processor to deliver exceptional performance of maximum network throughput of 176Mbps with extremely low power consumption. QNAP will also demonstrate the entire lineup of the 1 to 8-drive VioStor NVR models and the latest dual-core Intel® Atom™ VMware Ready™, Citrix® XenServer certified, and Microsoft Hyper-V compliant Turbo NAS (Network-Attached Storage) Series.Visit: Booth 2996, Dallas Convention Center, TexasExhibit Dates/Times: October 12-14, 2010 (Tuesday-Thursday), 9:00 am-4:30 pm dailyNetwork Video Surveillance System (NVR) Series Watch a demo of  the VioStor network video recorder from QNAP  QNAP VioStor NVR is a Linux-based, standalone IP video surveillance solution for network-based real-time monitoring, video recording, and playback. VioStor NVR supports high quality H.264, MPEG4, M-JPEG, and MxPEG recording from popular network camera brands including AXIS, ACTi, A-MTK, Arecont Vision, AVTECH, Canon, Cisco, CNB, Brickcom, DIGITUS, D-Link, EDIMAX, ELMO, EtroVision, GANZ, Hikvision, iPUX, IPX, IQeye, LevelOne, Linksys, Messoa, MOBOTIX, NAKAYO, Panasonic BB/BL/i-Pro, SANYO, SHANY, SONY, TOA, TOSHIBA, TRENDnet, Videosec, VIOSECURE, VIVOTEK, and Y-CAM. VioStor NVR offers industry-leading surveillance features such as 120-channel monitoring from multiple VioStor NVR servers, Intelligent Video Analytics (IVA), digital watermarking, SMS alert, up to 16TB storage capacity (8-bay models), and an exclusive mobile surveillance application VSMobile for wireless monitoring via iPod, iPhone, iPad, and Windows PDA phones. 8-bay, 16TB, 2U Chassis, VS-8040U-RP/VS-8032U-RP/VS-8024U-RP NVR (40/32/24-channel): Intel® Core™2 Duo 2.8GHz CPU, 2GB memory Redundant power supply available Megapixel recording Max network throughput: 300 Mbps 8-bay, 16TB, VS-8040/VS-8032/VS-8024 NVR (40/32/24-channel): Intel® Core™2 Duo 2.8GHz CPU, 2GB memory Megapixel recording Max network throughput: 300 Mbps 6-bay, 12TB, VS-6020 Pro/VS-6016 Pro/VS-6012 Pro NVR (20/16/12-channel): Dual-core Intel® Atom™ CPU & 1GB memory PC-less network surveillance by HD local display Megapixel recording Max network throughput: 176 Mbps 5-bay, 10TB, VS-5020/VS-5012 NVR (20/12-channel): Intel® Celeron® 1.6GHz CPU & 1GB memory Megapixel recording Max network throughput: 138 Mbps 4-bay, 8TB, 1U Chassis, VS-4016U-RP Pro/VS-4012U-RP Pro/VS-4008U-RP Pro NVR (16/12/8-channel): Dual-core Intel® Atom™ CPU & 1GB memory Redundant power supply available PC-less network surveillance by HD local display Megapixel recording Max network throughput: 176 Mbps 4-bay, 8TB, VS-4016 Pro/VS-4012 Pro/VS-4008 Pro NVR (16/12/8-channel): Dual-core Intel® Atom™ CPU & 1GB memory PC-less network surveillance by HD local display Megapixel recording Max network throughput: 176 Mbps Power-saving design, consumes only 35W 2-bay, 4TB, VS-2012 Pro/VS-2008 Pro/VS-2004 Pro NVR (12 /8 /4-channel): Dual-core Intel® Atom™ CPU & 1GB memory PC-less network surveillance by HD local display Megapixel recording Max network throughput: 176 Mbps Power-saving design, consumes only 25W 1-bay, 1TB, NVR-104 (4-channel) Up to 30 fps at CIF for each channel Power-saving design, consumes only 18W QNAP Turbo NAS Series Intel® Atom™ iSCSI Turbo NAS SeriesQNAP Turbo NAS Series is available from 2 to 8-bay models. Turbo NAS is certified as compatible with VMware® vSphere4 (ESX 4.0 and above), Citrix® XenServer™, and Microsoft Hyper-V virtualization platforms. The entire series offers enterprise-level iSCSI features such as SPC-3 compliant, multiple LUNs per target, MPIO, MC/S, and LUN (logical unit number) masking. Other features include dual Giga LAN, RAID 0/1/5/6/5 + hot spare/6 + hot spare configurations, online RAID capacity expansion, online RAID level migration, iSCSI target service with Thin Provisioning, Virtual Disk Drive support, AES 256-bit volume-based encryption, and more. Turbo NAS supports both 2.5-inch and 3.5-inch hard disk drives and up to 16TB storage capacity. It is an ideal solution for storage expansion of VioStor NVR Series.  

Add to Compare
QNAP launched VioStor Pro Series NVR with high-definition local display
QNAP launched VioStor Pro Series NVR with high-definition local display

QNAP Security, a leading manufacturer of Linux-embedded, stand-alone Network Video Recorder (NVR) solutions announced the launch of VioStor Pro Series, the world's first Linux-based NVR capable of truly PC-less quick configuration, monitoring of IP cameras over the network, and video playback via a high-definition (HD) VGA monitor or TV. The new models include 2-drive VS-2012 Pro/2008 Pro/2004 Pro, 4-drive desktop VS-4016 Pro/4012 Pro/4008 Pro and rack mount VS-4016U-RP Pro/ 4012U-RP Pro/4008U-RP Pro, and 6-drive VS-6020 Pro/6016 Pro/6012 Pro, all incorporate dual-core Intel® Atom™ processor and 1GB memory to deliver high performance network throughput of 176Mbps for high quality megapixel recording and extremely low power consumption. VioStor Pro Series NVR are pre-installed with the latest firmware version 3.3.0 which provides high quality H.264, MPEG4, M-JPEG, and MxPEG recording from over 800 IP camera and video server models of 36 brands, including AXIS, ACTi, A-MTK, Arecont Vision, AVTECH, Brickcom, Canon, Cisco, CNB, DIGITUS, D-Link, EDIMAX, ELMO, EtroVision, GANZ, Hikvision, iPUX, IPX, IQeye, LevelOne, Linksys, Messoa, MOBOTIX, NAKAYO, Panasonic BB/BL/i-Pro, SANYO, SHANY, SONY, TOA, TOSHIBA, TRENDnet, Videosec, VIOSECURE, VIVOTEK and Y-CAM. The NVR also supports abundant features such as 120-channel monitoring from multiple VioStor NVR servers without installing any other software, Intelligent Video Analytics (IVA) for faster video retrieval, generic IP camera integration by JPEG CGI command, digital watermarking, advanced event management, email and SMS alert, online RAID capacity expansion, online RAID level migration, HDD S.M.A.R.T., and dual Giga LAN. "QNAP is a market leader striving to provide full-featured, reliable, and innovative surveillance solutions for all sorts of security applications. We are proud to redefine the administration experience of the Linux-based NVR systems by supporting full HD (1920 x 1080) local display," said Andrew Yu, Product Manager from QNAP. "VioStor NVR administrators can configure the system, monitor the IP cameras and play the video conveniently via only a USB mouse and a VGA monitor connected to VioStor NVR. This is a feature that no other Linux-based network surveillance solutions can compare in the current market." For more information about VioStor Pro Series, please click here.The new VioStor NVR firmware version 3.3.0 also brings other stunning features including new IP camera models, and localised interface in Turkish. For the firmware download and further information, please visit this link.

Add to Compare

Browse Network Video Recorders (NVR) / Network DVRs

Network video recorders (NVRs) - Expert commentary

Sensor data fusion for more reliable intrusion alarm systems
Sensor data fusion for more reliable intrusion alarm systems

Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source.  This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag.   Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.

A three-point plan for enhancing business video surveillance
A three-point plan for enhancing business video surveillance

Cyber threats hit the headlines every day; however digital hazards are only part of the security landscape. In fact, for many organisations - physical rather than virtual security will remain the burning priority. Will Liu, Managing Director of TP-Link UK, explores the three key elements that companies must consider when implementing modern-day business surveillance systems.  1) Protecting more than premises Video surveillance systems are undoubtedly more important than ever before for a huge number of businesses across the full spectrum of public and private sector, manufacturing and service industries. One simple reason for this is the increased use of technology within those businesses. Offices, workshops, and other facilities house a significant amount of valuable and expensive equipment - from computers, and 3D printers to specialised machinery and equipment. As a result, workplaces are now a key target for thieves, and ensuring the protection of such valuable assets is a top priority. A sad reality is that some of those thieves will be employees themselves. Video surveillance system Of course, video surveillance is often deployed to combat that threat alone, but actually, its importance goes beyond theft protection. With opportunist thieves targeting asset-rich sites more regularly, the people who work at these sites are in greater danger too. Effective and efficient surveillance is imperative not just for physical asset protection, but also for the safety From this perspective, effective and efficient surveillance is imperative not just for physical asset protection, but also for the safety of colleagues as well. Organisations need to protect the people who work, learn or attend the premises. A video surveillance system is, therefore, a great starting point for companies looking to deter criminal activity. However, to be sure you put the right system in place to protect your hardware assets, your people, and the business itself, here are three key considerations that make for a successful deployment. 2) Fail to prepare, and then prepare to fail Planning is the key to success, and surveillance systems are no different. Decide in advance the scope of your desired solution. Each site is different and the reality is that every solution is different too. There is no ‘one-size-fits-all solution and only by investing time on the exact specification can you arrive at the most robust and optimal solution.  For example, organisations need to consider all the deployment variables within the system’s environment. What is the balance between indoor and outdoor settings; how exposed to the elements are the outdoor cameras; what IP rating to the need? A discussion with a security installer will help identify the dangerous areas that need to be covered and the associated best sites for camera locations. Camera coverage After determining location and coverage angles, indoors and outdoors, the next step is to make sure the cameras specified are up to the job for each location. Do they have the right lens for the distance they are required to cover, for example? It is not as simple as specifying one type of camera and deploying it everywhere. Devices that can use multiple power sources, Direct Current, or Power over Ethernet well are far more versatile You have to consider technical aspects such as the required level of visual fidelity and whether you also need two-way audio at certain locations? Another simple consideration is how the devices are powered. Devices that can use multiple power sources, Direct Current or Power over Ethernet as well are far more versatile and reliable. Answers to these questions and a lot more need to be uncovered by an expert, to deliver a best-of-breed solution for the particular site. 3) Flexibility breeds resilience Understanding exactly what you need is the start. Ensuring you can install, operate and manage your video surveillance system is the next step. Solutions that are simple to install and easy to maintain will always be favoured - for example, cameras that have multiple sources of power can be vital for year-round reliability. Alongside the physical aspect of any installation, there is also the software element that needs to be considered. The last thing organisations need is a compatibility headache once all their cameras and monitoring stations are in place. Selecting cameras and equipment with the flexibility to support a variety of different operating systems and software is important not just for the days following the installation, but also to future-proof the solution against change.  Easy does it Once the system is up and running, the real work of video surveillance begins. Therefore, any organisation considering deploying a system should look to pick one that makes the day-to-day operation as easy as possible to manage. And again - that is all about the set-up. Cameras can also provide alerts if they have been tampered with or their settings changed The most modern systems and technology can deliver surveillance systems that offer smarter detection, enhanced activity reporting so you learn more about your operations, and also make off-site, remote management easy to both implement and adjust as conditions change. For example, camera software that immediately notifies controllers when certain parameters are met - like motion detection that monitors a specific area for unauthorised access. Cameras can also provide alerts if they have been tampered with or their settings changed without proper authorisation. Remote management of HD footage What’s more, the days of poor quality or unreliable transfer of video are long gone. The high-quality HD footage can be captured, stored, and transferred across networks without any degradation, with hard drives or cloud-based systems able to keep hundreds of days of high-quality recordings for analysis of historical data. Finally, the best surveillance solutions also allow for secure remote management not just from a central control room, but also from personal devices and mobile apps. All this delivers ‘always-on’ security and peace of mind. The watchword in security Modern video surveillance takes organisational security to the next level. It protects physical assets, ensures workplace and workforce safety, and helps protect the operations, reputation, and profitability of a business.  However, this is not just an ‘off-the-shelf purchase’. It requires proper planning in the form of site surveys, equipment and software specifications, as well as an understanding of operational demands and requirements. Investing time in planning will help businesses realise the best dividends in terms of protection. Ultimately, that means organisations should seek to collaborate with vendors who offer site surveys - they know their equipment best, your needs, and can work with you to create the perfect solution.

Video surveillance as a service (VSaaS) from an integrator and user perspective
Video surveillance as a service (VSaaS) from an integrator and user perspective

Technology based on the cloud has become a popular trend. Most IT systems now operate within the cloud or offer cloud capabilities, and video surveillance is no exception: virtually every major hardware and software vendor offers cloud-based services. Users benefit from the cloud due to its numerous advantages, such as ease of implementation, scalability, low maintenance costs, etc. Video surveillance as a service (VSaaS) offers many choices, so there is an optimal solution for each user. However, what about integrators? For them, VSaaS is also a game-changer. Integrators are now incentivised to think about how they can maintain their markets and take advantage of the new business opportunities that the cloud model provides.   Hosted video surveillance The cloud service model has drastically changed the role of an integrator. Traditionally, integrators provided a variety of services including system installation, support, and maintenance, as well as served as a bridge between vendors and end-users. In contrast, hosted video surveillance as a service requires a security system installer to simply install cameras and connect them to the network, while the provider is in direct contact with each end-user. The cloud service model has drastically changed the role of an integrator There is no end to on-premises systems. However, the percentage of systems where the integrator’s role is eliminated or considerably reduced will continue to increase. How can integrators sustain their markets and stay profitable? A prospective business model might be to become a provider of VSaaS (‘cloud integrator’) in partnership with software platform vendors. Cloud-based surveillance Some VMS vendors offer software VSaaS platforms that form the basis for cloud-based surveillance systems. Using these solutions, a data centre operator, integrator, or telecom service provider can design a public VSaaS or VSaaS in a private cloud to service a large customer. The infrastructure can be built on any generic cloud platform or data centre, as well as resources owned by the provider or client. So, VSaaS providers have the choice between renting infrastructure from a public cloud service like Amazon Web Services, Microsoft Azure, or Google Cloud or using their own or clients’ computing infrastructure (virtual machines or physical servers). Gaining competitive advantage When integrators purchase commitment use contracts for several years, they can achieve significant savings As an example, a telecom carrier could deploy VSaaS on their own infrastructure to expand their service offering for clients, gaining a competitive advantage and enhancing profits per user. Using a public cloud, a smaller integrator can host the computing infrastructure immediately, without incurring up-front costs and with no need to maintain the system. These cloud services provide scalability, security, and reliability with zero initial investment. When integrators purchase commitment use contracts for several years, they can achieve significant savings. Next, let’s examine VSaaS options available in the market from an end-users point of view. With hosted (or cloud-first, or true-cloud) VSaaS solutions, all the video feeds are transmitted directly from cameras to the cloud. Optionally, video can be buffered to SD cards installed on cameras to prevent data losses in case of Internet connection failures. Dedicated hardware bridges There are many providers of such services that offer their own brand cameras. Connecting these devices to the cloud should only take a few clicks. Firmware updates are usually centralised, so users don’t have to worry about security breaches. Service providers may offer dedicated hardware bridges for buffering video footage and secure connections to the cloud for their branded and third-party cameras. Service providers may offer dedicated hardware bridges for buffering video footage Typical bridges are inexpensive, basic NVRs that receive video feeds from cameras, record on HDD, and send video streams to the cloud. The most feature-rich bridges include those with video analytics, data encryption, etc. Introducing a bridge or NVR makes the system hybrid, with videos stored both locally and in the cloud. At the other end of the spectrum relative to hosted VSaaS, there are cloud-managed systems. Video management software In this case, video is stored on-site on DVRs, NVRs, video management software servers, or even locally on cameras, with an option of storing short portions of footage (like alarm videos) in the cloud for quick access. A cloud service can be used for remote viewing live video feeds and recorded footage, as well as for system configuration and health monitoring. Cloud management services often come bundled with security cameras, NVRs, and video management software, whereas other VSaaS generally require subscriptions. Keep in mind that the system, in this case, remains on-premises, and the advantages of the cloud are limited to remote monitoring and configuring. It’s a good choice for businesses that are spread across several locations or branches, especially if they have systems in place at each site. On-site infrastructure All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version All locations and devices can be remotely monitored using the cloud while keeping most of the existing on-site infrastructure. All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version. Other methods are more costly and/or require more resources to implement. Hosted VSaaS helps leverage the cloud for the highest number of benefits in terms of cost and technological advantages. In this case, the on-site infrastructure consists of only IP cameras and network equipment. This reduces maintenance costs substantially and also sets the foundation for another advantage of VSaaS: extreme and rapid scalability. At the same time, the outgoing connection at each site is critical for hosted VSaaS. Video quality and the number of cameras directly depend on bandwidth. Broadband-connected locations Because the system does not work offline, a stable connection is required to stream videos. In addition, cloud storage can be expensive when many cameras are involved, or when video archives are retained for an extended period. The hosted VSaaS is a great choice for a small broadband-connected location The hosted VSaaS is a great choice for small broadband-connected locations and is also the most efficient way to centralise video surveillance for multiple sites of the same type, provided they do not have a legacy system. Since it is easy to implement and maintain, this cloud technology is especially popular in countries with high labour costs. Using different software and hardware platforms, integrators can implement various types of VSaaS solutions. Quick remote access For those who adhere to the classic on-premises approach, adding a cloud-based monitoring service can grow their value proposition for clients with out-of-the-box capabilities of quick remote access to multiple widely dispersed sites and devices. For small true-cloud setups, there is a possibility to rent a virtual machine and storage capacity in a public cloud (such as Amazon, Google, or Microsoft) and deploy the cloud-based VMS server that can handle dozens of cameras. In terms of features, such a system may include anything from plain video monitoring via a web interface to GPU-accelerated AI video analytics and smart search in recorded footage, depending on the particular software platform. Optimising internet connection Hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ needs High-scale installations, such as VSaaS for public use or large private systems for major clients, involve multiple parts like a virtual VMS server cluster, web portal, report subsystem, etc. Such systems can also utilise either own or rented infrastructure. Some vendors offer software for complex installations of this kind, though there are not as many options as for cloud-managed systems. Finally, hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ unique needs while optimising internet connection bandwidth, cloud storage costs, and infrastructure complexity. It’s high time for integrators to gain experience, choose the right hardware and software, and explore different ways of building systems that will suit evolving customer demands in the future.

Latest QNAP Security news

Dahua announces 88 models of PTZ series network cameras are now compatible with QNAP NAS
Dahua announces 88 models of PTZ series network cameras are now compatible with QNAP NAS

Dahua Technology, a solution provider in the global video surveillance industry, announced that an additional 88 models of its Eco-savvy 3.0, Wi-Fi 265 and H.265 PTZ series network cameras are now compatible with QNAP NAS from QNAP Systems, Inc. Now, more customers are able to choose Dahua Technology’s network cameras per their application scenarios. Comprehensive video surveillance Dahua Eco-savvy 3.0 network camera series can deliver real-time 4K video streams at 15 fps, providing security applications with impressive range of smart detection features including face detection, tripwire detection, and intrusion detection. Dahua Wi-Fi 265 series supports H.265 compression, Human Detection and Smart Tracking features. Dahua H.265 PTZ camera can provide large monitoring range with clear details, while the latest H.265 compression cuts bandwidth in half to ensure video recording with great security efficiency and lower cost. QNAP keeps improving product and third-party software compatibility. It released QVR Pro surveillance solution, QVR Center central management software and QVR Guard failover application to integrate comprehensive video surveillance features into NAS, providing live monitoring, storage expandability and storage space management functions for home and business users. Third-party integrations Open, Integration and Innovation has been Dahua Technology’s guiding principle. In recent year, the company has been working with more and more renowned third-party platforms, like QNAP NAS in this case, to greatly broaden the application scale of its cameras. This enables security users to enjoy the products and services provided by Dahua Technology in more applications.

MOBOTIX showcases new products and integration capabilities at Innovation Summit 2018
MOBOTIX showcases new products and integration capabilities at Innovation Summit 2018

MOBOTIX welcomed almost 200 Alliance and Channel Partners as well as flagship customers to the inaugural Innovation Summit Europe that took place in Valencia, Spain from the 6th to 8th of May. The Summit offered attendees valuable insights into new trends, sneak peeks at new products and technologies along with networking opportunities between the wider pan-European MOBOTIX community. Alongside the Summit, the Technology Partner Expo offered demonstrations showcasing integration capabilities from several technology leaders that work closely with MOBOTIX including ABP, Genetec, Kentix, Konica Minolta, Microsens, QNAP and Sesys. The Summit provided an alliance forum to showcase the exciting collaborative work with our technology partners we are doing across areas such as Cyber Security and Internet-of-Things" Cybersecurity and IoT “Our Innovation Summit expands on our ongoing strategy of making MOBOTIX more open and responsive to the needs of our customers and innovative technology partners,” explains Thomas Lausten, Chief Executive Officer of MOBOTIX. “The Summit also provided an alliance forum to showcase the exciting collaborative work with our technology partners we are doing across areas such as cyber security and Internet-of-things.” The Summit was hosted at the Barceló Hotel in Valencia and kicked-off with a Keynote speech from MOBOTIX CEO Thomas Lausten that provided insights into how Partners can focus on value by solving real world challenges using innovative MOBOTIX technologies. Presentation on video surveillance ‘Put Technology on Everything: Understanding an Exponential World’ was the topic of a talk by Enrique Dans, Futurist and Professor of Innovations at IE Business School of Madrid. In his work as a researcher, disseminator and advisor, Dans studies the effects of technological innovation on people, companies and society. Other presentations and demonstrations touched on areas such as video surveillance and cyber security within a full agenda aimed at helping attendees gain broader insights into emerging trends. “The summit also provided a great opportunity for networking with like-minded partners and MOBOTIX staff to explore potential business opportunities amongst guests that had been invited from nearly 30 countries,” Lausten adds.

QNAP Systems launches TS-x73 NAS series for enhanced data security
QNAP Systems launches TS-x73 NAS series for enhanced data security

QNAP Systems, Inc. has launched the cost-effective high-performance 4-bay (TS-473), 6-bay (TS-673), and 8-bay (TS-873) TS-x73 series NAS featuring an AMD RX-421ND quad-core CPU with Turbo Core up to 3.4GHz and two PCIe slots for installing a QNAP QM2 card, wireless network card or a graphics card to extend NAS functionalities. The TS-x73 series provides small and medium businesses with an ideal NAS solution to build a private cloud for applications including high-speed data transfer, backup/recovery, virtualisation, media playback and graphics display. “The TS-x73 NAS series presents a budget-friendly solution by allowing users to add more value to their NAS based on their individual needs. Through the two PCIe slots, users can install a QNAP QM2 card to add SSD caching/10GbE connectivity for boosted performance; a wireless card with WirelessAP Station app to turn the NAS into a wireless access point; or even an PCIe bus-powered graphics card to enable 4K transcoding and HDMI output for a greater media multimedia experience,” said Jason Hsu, Product Manager of QNAP.The TS-x73 provides optimal storage efficiency across M.2 SSDs, 2.5-inch SSDs and high-capacity HDDs Mitigating ransomware attacks The TS-x73 series is powered by a high-performance and energy-efficient AMD RX-421ND quad-core 2.1 GHz CPU (Turbo Core up to 3.4 GHz) and 4GB/8GB DDR4 RAM (up to 64GB). With an optional 10GbE network card installed, it delivers up to 1661 MB/s throughput and up to 1575 MB/s with AES-NI hardware-accelerated encryption. With two built-in M.2 SATA SSD slots and SSD caching (M.2 SSD sold separately), coupled with Qtier auto-tiering technology, the TS-x73 provides optimal storage efficiency across M.2 SSDs, 2.5-inch SSDs and high-capacity HDDs for balanced cost, performance, and capacity. The TS-x73 series supports block-based snapshots to record the state of the system at any time to help users mitigate the impact of ransomware attacks and to ensure the stability of service operations. Enhanced data protection The TS-x73 series features two PCIe (Gen3 x4) slots that allow greater system flexibility. In addition to installing a 10GbE network card for boosting virtualisation performance, users can also install a QNAP QM2 card that allows for adding two M.2 SSDs for SSD caching or to create a RAID 5-tiered storage along with the two M.2 SSDs in the NAS to increase data protection. There are also QM2 cards that include 10GbE 10GBASE-T connectivity to provide SSD caching with high-speed network connectivity on a single card. Alternatively, users could install a low-power graphics card (powered solely by the PCIe slot) to boost system performance and enable smooth 4K video transcoding and HDMI output; install a wireless network card (for example: QNAP QWA-AC2600) to use the TS-x73 as a wireless base station, allowing users to directly access the NAS, including NAS services and Internet connection.Users can also use QNAP VJBOD technology to leverage the unused space of another QNAP NAS for storage expansion Unified data storage solution The business-ready TS-x73 series is a NAS and iSCSI-SAN unified storage solution that not only supports VMware, Citrix, Microsoft Hyper-V and Windows Server 2016 environments, but can also natively host multiple virtual machines (with Windows, Linux, UNIX and Android) and containers (LXC and Docker). Storage space can be flexibly expanded using two 8-bay UX-800P or 5-bay UX-500P or four 10-bay REXP-1000 Pro expansion enclosures. Users can also use QNAP VJBOD technology to leverage the unused space of another QNAP NAS for storage expansion. Key specifications: TS-473-4G: supports 4 x 3.5-inch HDD or 2.5-inch HDD/SSD, 4GB DDR4 RAM TS-473-8G: supports 4 x 3.5-inch HDD or 2.5-inch HDD/SSD, 8GB DDR4 RAM TS-673-4G: supports 6 x 3.5-inch HDD or 2.5-inch HDD/SSD, 4GB DDR4 RAM TS-673-8G: supports 6 x 3.5-inch HDD or 2.5-inch HDD/SSD, 8GB DDR4 RAM TS-873-4G: supports 8 x 3.5-inch HDD or 2.5-inch HDD/SSD, 4GB DDR4 RAM TS-873-8G: supports 8 x 3.5-inch HDD or 2.5-inch HDD/SSD, 8GB DDR4 RAM Tower model; AMD RX-421ND quad-core 2.1 GHz CPU (burst up to 3.4 GHz), dual channel DDR4 RAM (4 x SODIMM memory slots, upgradable to 64GB); hot-swappable 2.5-inch/3.5-inch SATA 6Gbps HDD/SSD; 2x M.2 SATA 6Gb/s 2280/2260 SSD slots; 2x PCle Gen.3 x4 slots; 4 x USB 3.0 ports; 4x Gigabit LAN ports; 2x 3.5 mm microphone jacks (dynamic microphones only); 1x 3.5 mm Line-out audio jack; 1x built-in speaker

Related white papers

Choosing the right storage technology for video surveillance

The borderless control room

How security systems ensure healthy workplaces during COVID and after