From 21th to 23th January INTERSEC 2018 in Dubai will showcase the latest products in security, safety and fire protection. Bosch Security Systems will display its innovative security, safety and communications products on booth S1-I22, Saeed Hall 1.  

Future of video security

The IoT is changing the way we view video security, quite literally. Now, cameras need to be so much more than devices with which to simply capture images; they need to be far smarter than that. Today cameras are becoming an integral part of the vast digital connectivity infrastructure, they need to be shaped into intelligent sensors that have the ability to extract invaluable data to help businesses make improvements in the area of video security, and beyond. At INTERSEC Bosch introduces her latest “i” camera portfolio. This intelligent camera portfolio with built-in video analytics as standard will rewrite the rules of video security.

The ‘i’ cameras

These intelligent cameras with built-in video analytics as standard will rewrite the rules of video security. Basic requirements have not been dismissed. Highest image quality, bitrate management (reductions by up to 80 percent) and data security will always be a priority. It’s the added intelligence and connectivity that sets them apart from conventional cameras and makes them truly intelligent.

The ‘i’ camera portfolio consists of the IP 4000i, IP 5000i and IP 6000i fixed dome and bullet cameras, the AUTODOME IP 4000i, IP 5000i and IP 5000i IR moving cameras and MIC IP starlight 7000i and MIC IP fusion 9000i cameras.

These truly intelligent ‘i’ cameras are capable of:

  • Interacting and sharing information with other devices
  • The ability to perform tasks independently
  • Detailed interpretation for situational awareness – object speed, direction, color, size etc.

IP 4000i, IP 5000i and IP 6000i cameras

A completely renewed portfolio with fixed dome and bullet cameras. From retail to industrial solutions, a smart combination of these cameras offers solutions for indoor or outdoor, day or night, discrete or visible video security. With built-in video analytics as standard, they offer the ability to start repurposing captured video data for other uses than security alone.

The new Bosch AUTODOME moving cameras give the ability to locate, track and zoom in on objects quickly and easily

AUTODOME IP 4000i, 5000i and 5000i IR

These moving cameras give the ability to locate, track and zoom in on objects quickly and easily. With a resolution of 1080p combined with 30x optical zoom, users can easily identify objects over large distances, offering total control of what they choose to see. The new AUTODOME IP 4000i, IP 5000i and IP 5000i IR cameras from Bosch now add metadata to all captured video images. This data can be used to improve security by automatically alerting users once pre-defined criteria are met or for other uses beyond security.

MIC IP starlight 7000i and MIC IP fusion 9000i

The true potential of the MIC IP moving cameras is the combination of their rugged design with built-in Intelligent Video Analytics that is specifically designed for the most demanding environments. Even in the most extreme conditions, video data can be interpreted directly at the source to further improve the level of security or enable the video data to do more than security alone.

The new MIC IP fusion 9000i offers a unique feature in terms of video analytics: metadata fusion. It fuses the metadata of the camera’s built-in optical and thermal imager, providing users with full situational awareness - regardless of whether it’s the optical or thermal video stream that’s being watched. Metadata fusion helps users to focus on ‘invisible’ things that need attention.

Another innovation offered by both MIC IP models is video analytics in motion. An operator is alerted, or the camera’s Intelligent Tracking feature is triggered, the moment a moving object or person is detected while the MIC IP camera is panning, tilting or zooming.

BVMS 8.0 brings new functionalities that allow security operators to
respond faster to incidents

Building Integration System 4.5

The Bosch Building Integration System (BIS) is a software solution that manages different Bosch security subsystems like access control, video surveillance, fire alarm, public address or intrusion systems on one single platform.

Now, BIS is more integrated than ever. Visit us to see how BIS 4.5 can easily manage even more systems, such as Bosch AVIOTEC cameras for early smoke and fire detection or the Bosch’s PAVIRO Public Address System.

Bosch Video Management System 8.0

BVMS 8.0 brings new functionalities that allow security operators to respond faster to incidents by monitoring more cameras concurrently and more efficiently.

Experience how the Bosch Video Stitcher combines multiple high-resolution cameras into a single panoramic view. This allows an operator to have better overview of an airfield at an airport or a harbor. And of course, with BVMS operators get the best out of the technology of our Bosch cameras. With BVMS 8.0, it is so easy to switch between the optical and thermal imager of our MIC IP fusion 9000i so surveillance can continue even in a smoke-filled tunnel.

In-Store Analytics solution for retailers

Merchandising and customer service can set your stores apart from online retail, helping you increase loyalty and sales. Based on cameras with built-in video analytics, the FLEXIDOME IP panoramic 7000, you can use In-Store Analytics to provide your merchandising and operations teams with reliable customer traffic insights to make informed decisions. Learn how to maximise customer engagement and service performance in your stores, or ensure sufficient staffing during peak times to continually optimise the quality of customer service.

LB20 series loudspeakers from Bosch are a cost-effective “go-to” solution featuring superior audio

B and G Series – The Integrated Security Solution

More security, greater control: Check out integrated solutions with G and B Series for intrusion detection, door control, video integration, UL fire functionality and mobile access.

LB20 premium commercial loudspeakers

Designed with the contractor in mind, LB20 series loudspeakers from Bosch are a cost-effective “go-to” solution featuring superior audio. Acoustically matched and aesthetically compatible with other Bosch models, the LB20 series incorporates innovative features that efficiently address the real-world needs of both the installer and the end-user. The innovative wall-mount system makes installation easy. All models are weather resistant, weatherproof versions are also available.

PAVIRO Public Address and Voice Evacuation System

Using IP networking technology, PAVIRO provides a highly flexible, reliable and secure system solution with superior audio quality and low latency – independent of distance and project size. As installers can use existing networks in the building infrastructure, relying on IP technology also results in faster installations and lower implementation costs.

Sony maximum performance in low-light situations

With the SNC-VB770 4K network camera from Sony there is no more need to fear darkness. Thanks to the ultra-high sensitivity of ISO 409600 this camera captures crisply detailed Ultra HD color video footage in near darkness where other cameras struggle.

The extra detail of 4K means that fewer cameras are needed to cover airports, shopping malls and other large sites – reducing hardware inventory, simplifying installation and cutting running costs. On top of that, smart analytics allow for just one camera to recognise and intelligently track several moving objects with high resolution without sacrificing overall situational awareness of the whole scene. It’s like having a PTZ camera for close-ups plus a wide-area fixed camera in the same box.

Sony’s latest G6-R cameras provide cutting-edge image capture technology

Sony’s latest G6-R cameras provide cutting-edge image capture technology with minimum illumination of 0.006 lux. These eight new models can capture images beyond the reach of conventional security cameras, helping to provide security professionals with better visibility and in turn greater accuracy.

With the V Series Security professionals can capture objects in dark conditions from a distance of up to 100m. The E Series features SD card recording as a back-up option in the event of network outage as well as 2-way audio, providing users with remote intercom and audio recording functionality wherever it is needed.

Award winner AVIOTEC IP starlight 8000

AVIOTEC IP starlight 8000 for video-based fire detection, which has won several awards over the last two years, is now VdS-certified and the perfect answer for facilities used for industry, transportation, warehousing and utilities such as energy to minimise detection time with low false alarm rates. Bosch technology spots fires and disturbances, predicts behavior to reduce false alarms and speeds up reaction times – helping you stop threats before they spread.

Monitored project planning

Bosch’s newest planning and support tool enables users a precise design according to EN-54 regulations, including the allocation of peripherals on different loops. Taking into consideration the actual topology, the Security Systems Designer ensures that every project detail is taken into account. This is made possible through a complete plausibility check and the automatised as well as customised provision of a comprehensive documentation, fitted precisely to your needs.

Download PDF version

In case you missed it

What are the security challenges of the hospitality market?
What are the security challenges of the hospitality market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?

Physical and cyber security precautions when travelling
Physical and cyber security precautions when travelling

Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen  Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms.  When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.

Mass transit security evolves with modern security solutions
Mass transit security evolves with modern security solutions

As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.