CCTV Observation Kits (75)
Launched by Dahua Technology, Dahua WizMind is a full portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, Thermal and software platform which adopts industry-leading deep learning algorithms. Focusing on customer’s requirements, WizMind provides precise, reliable and comprehensive AI solutions for verticals. Series Overview With starlight solution and deep learning algorithm, Dahua WizMind 5 Series network camera has various intelligent functions, including face capture, perimeter protection and people counting, which greatly improve the accuracy of video analysis Functions Face DetectionDahua Face Detection technology can detect the face in the image. With deep learning algorithm, the technology supports detecting, tracking, capturing and selecting the best face image, and then outputs face snapshot. Face AttributesDahua Face Detection technology can detect the face in the image. With deep learning algorithm, the technology supports detecting, tracking, capturing and selecting the best face image, and then outputs face snapshot. Perimeter ProtectionWith deep learning algorithm, Dahua Perimeter Protection technology can recognize human and vehicle accurately. In restricted area (such as pedestrian area and vehicle area), the false alarms of intelligent detection based on target type (such as tripwire, intrusion, fast moving, parking detection, loitering detection and gathering detection) are largely reduced. People CountingWith deep learning algorithm, Dahua People Counting technology can track and process moving human body targets to realize the accurate statistics of enter No., leave No., and In Area No. Working with management platform, it outputs yearly/monthly/daily reports to meet your requirements. ePoEDahua's innovative ePoE technology offers a new solution to transmit power and data over long distances between cameras and network switch, allowing more flexible design of surveillance system, improving reliability, reducing installation time and saving money. ePoE technology encompasses pure network systems where a single CAT6 cable can carry signals up to 300 m (984 ft) at 100 Mbps, 800 m (2625 ft) at 10 Mbps. Cyber SecurityDahua network cameras employ a series of security technologies, including security authentication and authorization, access control protocols, trusted protection, encrypted transmission and encrypted storage. These technologies improve the camera's defense against external cyber threats and prevent malicious programs fromcompromising the device. Protection (IP67, IK10, wide voltage)IP67: The camera passes a series of strict test on dust and soak. It has dust-proof function, and the enclosure can works normal after soaking in 1 m deep water for 30 minutes. IK10: The enclosure can stand the punch more than 5 times from a 5 kg hammer falling from a height of 40 cm (Impact energy is 20J). Wide voltage: The camera allows ±30% (for some power supplies) input voltage tolerance (wide voltage range), and it is widely applied to outdoor environment with instable voltage.
IntelliSight is a complete video management solution providing users with convenient, intelligent, real-time, and secure surveillance services. The system consists of edge AI camera, NVR&AI Server, Cloud Server, Desktop Management Software and Mobile APP. IntelliSight is the best choices for small and medium office buildings, retail shops, supermarkets, schools and other private and public area. The IntelliSight consists of 5 major modules, auto-find and quick config all terminals, multiple-windows' preview, 4 channels playback, e-map function and smart event center.
exacqVision open platform VMS software is intuitive, able to be centrally managed and integrates easily into third-party technologies including more than 5,000 cameras. If you are interested in learning more about this update, sign-up for access to the recorded webinar: https://register.gotowebinar.com/recording/7716757850369436934 The exacqVision 21.09 software update includes newly added support for object classification analytics with the Illustra ProGen4 and Axis camera lines. This update also includes removeable privacy windows for industries such as law enforcement agencies, prisons, and rail companies that require additional privacy controls for sensitive video.
System Overview Pro Series is a perfect choice for SMB solutions and projects where both high reliability and flexibility are required. All cameras are equipped with Starlight feature, 120dB true WDR and 3DNR, and are able to provide clear images and rich details even under tough lighting conditions. Functions Full-colorFull-color camera adopts large aperture lens and high performance sensor. With higher amount of absorbed light and advanced image processing algorithm, the camera provides 24/7 color monitoring that collects clear and vivid information,significantly increasing probability of gathering valid human, vehicle, and event evidence that can be used for further intelligent analysis. Broadcast-quality AudioAudio information is used as supplementary evidence in video surveillance applications. The HDCVI camera supports audio signal transmission over coaxial cable. In addition, it adopts unique audio processing and transmission technology that best restores source audio and eliminates noise, guaranteeing the quality and effectiveness of collected audio information.*This function is available for select models. Wide Dynamic RangeWith advanced Wide Dynamic Range (WDR) technology, Dahua HDCVI camera provides clear details in the environment of strong brightness contrast. The bright and dark area can get clear video even in high brightness environment or with backlight shadow. Advanced 3DNR3DNR is noise reduction technology that detects and eliminates random noises by comparing two sequential frames. Dahua’s advanced 3DNR technology allows remarkable noise reduction with little impact to sharpness, especially under limited lighting condition. Besides, the advanced 3DNR effectively decreases the band width and saves the storage space. Warm Supplemental lightsWith warm supplemental LED lights, the camera is able to provide a coloful and vivid image even in total darkness. By default, the camera is set to smart light mode, in which the camera can automatically adjust the exposure time and light sensitivity simultaneously to avoid overexposureing of the objects in the image center. 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the XVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility.* Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 700m transmission for 2MP/5MP/8MP HD video via coaxial cable, and up to 300m via UTP cable.*Actual results verified by real-scene testing in Dahua's test laboratory. Protection (IP67, wide voltage)IP67: The camera passes a series of strict test on dust and soak. It has dust-proof function, and the enclosure can works normal after soaking in 1 m deep water for 30 minutes.Wide voltage: The camera allows ±30% (for some power supplies) input voltage tolerance (wide voltage range), and it is widely applied to outdoor environment with instable voltage.
Decrease Reaction Time. Increase Awareness. Improve Your Security. The victor Video Management System (VMS) and VideoEdge Network Video Recorder (NVR) platforms allow users to see and prevent more events before they occur. Save administrator resources with powerful features like person-based intelligent search, narrowing down search time from minutes to seconds and gain the upper hand against potential threats. Leveraging high-performance smart video searching, video intelligence, and case management along with an extensive feature set, users gain greater situational awareness. VideoEdge network video recorders are available with a full range of purpose-built appliances to manage surveillance in comprehensive environments both onsite and remotely. Maintain dozens of cameras per network video recorder with capabilities for both IP and hybrid installations. The flexibility of VideoEdge provides users with powerful analytics to gather employee and consumer information that aid in forensic investigation or business intelligence. Mix and match hundreds of VideoEdge IP or hybrid NVRs to accommodate thousands of cameras into one cohesive victor VMS ecosystem. Designed with a scalable portfolio of clients, customizing a victor solution for any business is simple. From the easy-to-use victor Express to the command and control of victor Professional, the VMS allows your company to use smarter technologies that include tools to reduce bandwidth costs. Combine deployments into victor Enterprise to manage a robust infrastructure in support of thousands of VideoEdge network video recorders. Bring together access control, intrusion, and fire systems correlated with video into one powerful, intuitive interface that operates in seamless harmony. victor is your always on, always available, secure video surveillance solution.
With its own device certificate issuing system, Root CA, the Wisenet camera lineup offers the highest levels of cybersecurity possible. Secure by Default, Hanwha Techwin’s cybersecurity policy, embeds unique certificates into all products during each step of the development and manufacturing process. This results in a cybersecurity policy that satisfies stringent UL CAP standards as well as our own requirements for product reliability and design innovation.
System Overview Driven by advanced smart H.265 encoding technology, Dahua Smart Dual Illuminators Camera combines precision and reliability into one powerful camera, achieving high encoding efficiency, producing seamless videos and reducing cost on transmission and storage. To meet a wide range of shooting situations, this series of high-performant cameras features functions such as infrared and warm light smart illumination, human shape detection, and siren and light active deterrence. It also achieves the application of retrospect, intervention and precaution, delivering the convenience needed in a modern camera. Functions Smart Dual IlluminatorsDahua Smart Dual Illuminators technology adopts smart algorithm to detect targets. Usually, the IR illuminator is on at night; when the target appears in the monitoring area, the white light is on, and the camera records the full-color video and information of key events. That is, the camera links snapshot and video with full-color image. When the target is out of the monitoring area, the white light is off and the IR illuminator is on, which reduces light pollution efficiently. Siren and Light Active DeterrenceThe camera supports the white light alarm and voice alarm when perimeter event occurs, to realize the deterrence and effective intervention. The camera is built in the alarm voice, and supports customized voice importing. IVSWith advanced video algorithm, Dahua IVS technology supports intelligent functions, such as tripwire and intrusion. Wide Dynamic RangeThe camera achieves vivid images, even in the most intense contrast lighting conditions, using industry-leading wide dynamic range (WDR) technology. For applications with both bright and low lighting conditions that change quickly, WDR optimizes both the bright and dark areas of a scene at the same time to provide usable video. Smart H.265+Smart H.265+ is the optimized implementation of the H.265 codec that uses a scene-adaptive encoding strategy, dynamic GOP, dynamic ROI, flexible multi-frame reference structure and intelligent noise reduction to deliver high-quality video without straining the network. Smart H.265+ technology reduces bit rate and storage requirements by up to 70% when compared to standard H.265 video compression. SceneIt is suitable for use by families and in fish ponds, orchards, rural courtyards, small factories, supermarkets and other similar locations.
Security breaches are not governed by the seasons, by the weather, and certainly not by the time of day. They can occur at any time, and often under the cover of darkness when traditional, black-and-white security cameras with infrared lighting are unable to capture events clearly enough to collect clear evidence or respond effectively. Hikvision has expanded its full-colour camera range with ColorVu technology. This offers a much better visual experience than traditional cameras, providing accurately rendered colour images with balanced brightness at all times of the day or night. The camera range with ColorVu technology includes 4k cameras for UHD experience and varifocal cameras for unparalleled clarity. These innovations allow organisations and local authorities to monitor outdoor or indoor spaces, identify breaches as soon as they occur, and react in real-time to protect staff, employees, and members of the public. Boosting security with leading-edge technology Cameras with ColorVu technology can capture high-definition, full-colour images in low light conditions because of two key technology breakthroughs: advanced F1.0 large apertures, and high-performance imaging sensors. The cameras also use a new 3D dynamic noise reduction (DNR) algorithm to increase clarity at long range, and a soft and warm supplemental light guarantees colourful images even in zero-light environments. The expanded camera range with ColorVu satisfies different needs of customers, from high-performance products to budget-friendly choices, as well as smart solutions. For example, the range now includes a 4K camera that offers ultra-high-definition colour imaging during the day and at night. With better image quality and richer details, 4K cameras with ColorVu can be applied in wider scenarios such as stadiums, airports, harbours, and parking lots, where clear and high-resolution images are necessary. The cameras with ColorVu can also integrate Hikvision AcuSense technology to distinguish between people, vehicles, and other moving targets such as rain, leaves, and animals. Alarms are only triggered when preset intrusion types are detected, allowing security teams to take action. 4 key applications for the cameras with ColorVu The ability to capture clear, full-colour images 24x7 is useful for a wide range of indoor and outdoor scenarios. Examples include: Security for outdoor spaces – especially streets and parks Lighting on streets and in parks is rarely uniform, and dark areas can increase the risk of crime and make people feel unsafe. Cameras with ColorVu technology enable local authorities to record high-resolution, full colour video footage even in low-light conditions, which helps to increase security and enables much faster responses to incidents. Improved perimeter protection for retail and logistics parks Perimeter protection is always a challenge for large retail and logistics parks. With ColorVu technology, security teams can monitor the perimeter 24x7 and react quickly to any breaches before assets or people are put at risk. Cameras with ColorVu can also be combined with other smart video technologies from Hikvision – including AcuSense vehicle and license-plate recognition – to trigger automated alerts for suspected security breaches. Asset protection for small businesses Small businesses around the world need to protect their assets, including vehicles left in driveways or on the street. Because cameras with ColorVu technology can capture high-resolution, full-colour images 24x7, security breaches can be recorded, and evidence passed on to the authorities increasing the chance that assets can be recovered and that perpetrators will be brought to justice. Increased security at building entrances High-resolution, full colour images can greatly enhance security at building entrances, which are sometimes unlit, or dimly lit. Even though cameras with ColorVu can record footage in extremely low light conditions, teams often choose to turn on the cameras’ supplementary light as an additional deterrent to a break in or another security incident. These examples are the tip of the iceberg in terms of how and where cameras with ColorVu technology can be deployed to boost security and protect people and assets. For more information about the ColorVu technology, visit Hikvision’s website.
With starlight solution and deep learning algorithm, Dahua WizMind 5 Series network camera has various intelligent functions, including face capture, perimeter protection and people counting, which greatly improve the accuracy of video analysis. The series camera supports dustproof function, waterproof function and vandal-proof function, complying with the standards of IP67 and IK10 (Supported by some select models).
System OverviewActive Deterrence Series provides multi-dimensional system that links video with audio, information and alarm to verify potential risks. Active deterrence camera can actively warn off intruders with light and speaker, alert users in real-time with alarm-over-coax, and provide visual verification with HDCVI video. Functions Active DeterrenceActive deterrence is to warn off intruders actively with white light and speaker even before users are aware of the incidence. Once an intrusion is detected, the white light will turn on and the speaker will buzzer to alert the intruder. The white light can be set to normally on or flash, the content of speaker is configurable. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analogue surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional analogue system without replacing existing coaxial cabling. The plug and play approach enables high definition video surveillance without the hassle of configuring a network. Smart IlluminationThe camera is designed with IR illumination for best lowlight performance. Smart IR is a technology to ensure brightness uniformity in B/W image under low illumination. Dahua’s unique Smart IR adjusts to the intensity of camera's infrared LEDs to compensate for the distance of an object, and prevents IR LEDs from overexposing images as the object come closer to the camera. 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the XVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility. * Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 700m transmission for 2MP/5MP/8MP HD video via coaxial cable, and up to 300m via UTP cable. * *Actual results verified by real-scene testing in Dahua's test laboratory. Protection (IP67, wide voltage)IP67: The camera passes a series of strict test on dust and soak. It has dust-proof function, and the enclosure can works normal after soaking in 1 m deep water for 30 minutes. Wide voltage: The camera allows ±30% (for some power supplies) input voltage tolerance (wide voltage range), and it is widely applied to outdoor environment with instable voltage.
Hikvision launched newly updated HikCentral Professional 2.0 security software (“HCP 2.0”), which blends feeds from multiple systems onto a single platform. HCP 2.0 can be configured to link video security devices, alarm and access control systems, and more, including third-party systems through the OpenAPI – for easy centralized management of a variety of security and business applications. Frank Zhang, President of Hikvision’s International Product and Solution Center, said, “This is an important release for us, and a significant leap forward in our security management software offerings. HikCentral Professional 2.0 will help our customers manage a variety of activities seamlessly on one platform. We’re excited to see the value it delivers.” Nine key applications for numerous business needs HikCentral Professional 2.0 integrates multiple business and security systems with nine key applications, making it valuable to a wide variety of common security and business scenarios seen in buildings, factories, stores, apartments, and the like. Among them, video cameras and security alarms are integrated into the platform to deliver fluid live viewing and timely alarm notifications. Furthermore, access control can be included to assign a variety of access permissions using multiple methods including facial recognition, ID cards, fingerprints, QR codes, and more. HCP 2.0 also allows various personnel such as HR managers to set flexible attendance rules, including schedules for shift work, while delivering full reporting facilities. Additionally, site managers can also employ vehicle management and visitor management applications to streamline entrance management as well as on-site parking. Users can further rely on HCP 2.0 with intelligent analysis and reporting – an application that collects data and transforms it into easy-to-understand reports and dashboards. This includes flow status, people density and more. For systems management teams, HCP 2.0’s system maintenance application visualizes alarm and device notifications, as well as the full network and device topology for rapid, targeted action in unusual events. Last but not least, HCP 2.0 lets users deploy digital signage systems to display advertisements and announcements. The software comes with eight pre-installed templates for users to present content optimally. This can be crowd numbers and temperature status in a supermarket scenario, for example. Creating truly unified systems with enhanced security and greater operational efficiency With HCP 2.0, users will flexibly unite applications and build a tailored system to match their security and business needs. The unified approach not only creates greater situational awareness of their security environment, it also reduces real day-to-day management resources previously required by disparate systems. For example, users can integrate visitor management with vehicle management to enhance daily operational efficiency for building facilities. Facility managers can register visitor information into the HCP 2.0 system, and – by linking to an ANPR system – can set visitors to be automatically permitted into on-site parking. Similarly, the system can also pre-authorize visitor access to specific areas of an organization’s premises. Personalized user experience HikCentral Professional 2.0 can be tailored to deliver specific information to assigned users. The system comes with three pre-configured roles: “system installation and management,” “security control and management,” and “attendance management.” In this way, HR staff can customize their feed to show employee attendance status, for example, while management staff can monitor security of the facilities. There is also one custom role, which can be tailored to specific needs. Perhaps most importantly, HikCentral Professional 2.0 features an improved user interface. Users can customize the control panel to suit their viewing preferences, simply dragging and dropping key video and device feeds into the dashboard, adjusting where they sit and how they look. Dynamic and intuitive user interface HCP 2.0 also incorporates multiple visualized dashboards that display key security and business insights generated from various applications, facilitating decision-making processes with more accuracy and efficiency. What’s more, users apply 3D E-maps that vividly demonstrate device monitoring statuses in different locations, and manage instant alerts interactively by clicking and watching associated live videos and other integrated system information. Easy setup and maintenance HikCentral Professional 2.0 is easy to deploy and quick to set up for a multitude of projects with single applications. Customers with minimum system requirement of Intel i3-CPU and 8 GB RAM can get up and running with a one-click installation procedure that makes HCP 2.0 setup a breeze. Operations guidance wizards are conspicuously displayed to support users in configuring key applications. In addition, the visualized health monitoring dashboards enable more focused and efficient IT maintenance.
System OverviewLeveraging the latest in thermal technology, the thermal network hybrid bullet camera features visual and thermal channels providing you with an all-in-one video monitoring solution. It supports 18 color palettes and is applicable for use in indoor and outdoor scenarios such as factories, substations and machine rooms Functions Uncooled Vox TechnologyBlends a vanadium oxide uncooled focal plane detector with compact volume and high thermal sensitivity (NETD) to accurately capture image details and detect temperature differences. Fire Detection & AlarmHarnesses a self-developed, core fire detection technology to maintain high accuracy levels and a low false alarm rate. It is widely used for fire detection in various industries. Temperature MeasurementUses a self-developed, temperature measurement technology to maintain highly accurate temperature measurements in windless indoor conditions with relatively stable temperatures. AI IntelligenceAdopts smart dual illuminators technology, to accurately detect violations such as calling and smoking. Intelligent Video System (IVS)IVS is a built-in video analytics algorithm that delivers intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. Sound and Light AlarmWhen an abnormal event is detected by a thermal or visible-light channel, the white light and loudspeaker will switch on to release a visual or voice prompt, then it will begin recording and take snapshots. SceneApplicable for use in scenarios that need to measure device temperatures such as factories, stations, substations and machine rooms.
Razberi Monitor is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. Purpose-built for security professionals, it monitors and manages all the system components for cybersecurity and system health and can be deployed from the cloud or on-premise. It provides secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. It also predicts and prevents problems while providing a centralized location for IT departments to view video data. What is Monitor’s key USP? A vital benefit of Monitor is that it protects against the multiple commonly cited cyberattack vulnerabilities. These include weak passwords, the failure to update software or firmware, the lack of best practices for routine maintenance, and not aligning with network IT policy. The benefit of having Monitor ensures shorter response times to cybersecurity events along with real-time alerts and logs to proactively notify users of active threats. It can detect cyber posture and problems with servers, cameras, and other IoT devices in real-time. You can track security devices by location and get deep visibility into configurations, operating systems, and firmware status. This means that without IT resources, you can still know what devices need updates and patches. Why choose Monitor? Monitor can be offered to enterprises as a managed service with a monthly subscription. This means no significant upfront costs and the ability to free up cash flow. The Monitor software will optimize and secures networks, reducing costs, time, and manpower required to install and manage an enterprise network. Users can create custom views and alerts by location, device, and problem type. They can use these reports to demonstrate system performance and compliance, share access to these reports with their service provider for proactive support, and reduce service calls. Monitor in Action Monitor enables proactive maintenance by offering problem resolutions before they become more significant issues. It does this by ensuring that the system is working as expected through continuous checks on the system’s health and cybersecurity and prevents service outages with early warning indicators. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable OPEX cost saving. For example, if there is an incident in a supermarket and a client wanted to review their cameras, only to realize that they had stopped recording some weeks before. With Monitor, if the client’s cameras are failing or are in any way beginning to compromise, this would be immediately detected by Monitor and flagged in advance of it failing. Thus, when an incident does occur that requires video verification, clients can be assured that the video data will be available to review the incident.
Launched by Dahua Technology, Dahua WizMind is a full portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, Thermal and software platform which adopts industry-leading deep learning algorithms. Focusing on customer’s requirements, WizMind provides precise, reliable and comprehensive AI solutions for verticals. Series Overview Dahua IVSS goes beyond the ordinary NVR products. It is an Intelligent Video Surveillance Server that combines video management features with traditional video storage functions in one device. Besides the basic functions as a network video recorder, IVSS is integrated with features such as face detection and face recognition for different business and industrial applications. With the build-in deep learning module, IVSS series products adopt video image metadata technology based on deep learning algorithms, offering high-precision human face recognition and perimeter protection. By applying deep learning artificial intelligence, IVSS allows users to focus on what matters most, to improve event response time and help make video actionable. An all new UI design supports device operation and maintenance management, improving the value and experience of surveillance view, and serving the era of security big data. Functions Face RecognitionSupports recording faces by metadata and real-time crosscheck with incredible accuracy to figure out the face with target features. With the Regular and Stranger face mode, IVSS triggers various kinds of alarm actions for different applications. AI IVSWith deep learning algorithm, AI IVS technology can recognize human and vehicle accurately. In restricted area (such as pedestrian area and vehicle area), the false alarms of intelligent detection based on target type (such as tripwire, intrusion, parking detection, loitering detection and crowd gathering estimation) are largely reduced. Video MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Currently, there are four main kinds of metadata in the security industry: Human face, human body, and motor vehicle and non-motor vehicle metadata. AI SearchSupports search by metadata of human and vehicles. Supports uploading face pictures to IVSS and compare them with recorded faces in IVSS by similarity. IVSS enables operators to quickly and easily search through multiple channels and long duration, to efficiently find out when and where a person of interest appeared. ANPRAutomatic Number Plate Recognition available for convenient entrance/exit management. This feature provides number plate recognition (working with Dahua ITC camera), number plate comparison with blocklist/allowlist, vehicle database management, and vehicle record search. N+M Hot StandbyThe highly reliable redundancy N+M Hot Standby design provides a secure failover technique to ensure immediate backup. In the event of a system failure, the sub device instantly takes over the main device to ensure no data loss. Smart TrackingThe automatic tracking PTZ feature automatically tracks a moving target throughout the camera's field of view. This function is ideal for following an object as it moves through airports, parking lots, city centers, or other scenes
Hikvision, an IoT solution provider with video as its core competency, announced its latest traffic product offering - the All-Rounder ITS camera - designed to improve road safety and optimise traffic flow. As the name implies, the camera encompasses different skills and abilities, boasting speed detection, traffic violation detection, automated plate recognition, and vehicle attribute analysis in one housing. “Hikvision is always pushing the boundaries of video technologies. Beyond the visual range that is perceived by video cameras, the abilities to understand other kinds of “senses” would allow even more precise monitoring and reporting of events or accidents,” says Frank Zhang, President of International Product and Solution Center at Hikvision. “This is multi-dimensional perception, a trend that we think will affect the security industry in the future.” Optimising traffic flowThe new ITS camera is designed and developed with this multi-dimensional concept in mind. It is Hikvision’s first camera to integrate three otherwise separate modules in one unit with no compromise on performance, making the camera neat and flexible to be deployed for demanding environments, all in an easy and cost-effective manner. The product provides an HD camera, speed radar, and light array inside one housing. Specifically, it works with a multi-tracking radar that continuously monitors up to two or three traffic lanes - depending on the camera model, and identifies the speed and position of objects in the monitored area at a speed of up to 300 km/h. If a vehicle violates the speed limit, the embedded radar triggers the connected camera and a picture is taken of the vehicle and its licence plate. Conventional ANPR systemsIn the event of infringements of traffic rules such as wrong-way driving, improper lane usage, or even failure to use a seat belt, the camera will capture images of the corresponding vehicle, recognise its licence plate and relevant information including vehicle type, colour, brand, and direction of movement, which can be addressed to the authorities in real-time or stored on board. Incident detection helps to improve overall driving standards, which ultimately reduces the number of accidents, improves road safety and further evens traffic flow. Employed with Deep Learning algorithms, the camera is able to recognise a much higher number of licence plates and with higher efficiency than conventional ANPR systems. Its GMOS sensor further ensures brighter and smoother images to be reproduced in challenging lighting conditions, especially in low-light environments. The camera’s embedded supplemental light features a 16-bead light array, offering an IR range of up to 40 metres at night. Seamless onsite configurationAs all of these functionalities are integrated, the single product itself outperforms conventional ITS products with space-saving and less cabling for easier installation. It supports flexible pole- or side-mounting, which makes onsite configuration effortless. The Hikvision All-Rounder ITS camera is ideal for various scenes such as urban roads, highways, tunnels and toll stations.
Suitable for: AllroundDual M15 AllroundDual M15 Thermal DualMount for S15 SurroundMount for S15 When operating the camera, it needs to be fitted either with sensor or blind modules. This closes off the front element and protects the camera against foreign objects, insects and water.Add to Compare
The VMC-2 Dallmeier offers a new Video Management Centre with touch screen for the convenient and intuitive control of video systems. The Video Management Centre VMC-2 stands out due to its ergonomic and intelligent design. It is made up of a touch screen, a joystick and a jog-shuttle. The individual components are modular and flexible, i.e. they are freely positionable and thus ideally suited for both left- and right-handed operators. Moreover, it is possible to use the components independently as stand-alone devices. The VMC-2 is compatible with SeMSy® III video management systems and is DIN EN 50130-4 compliant. VMC joystick By using the joystick, the security operator is able to control movable cameras conveniently. Pan, tilt and zoom movements can be carried out intuitively. With just a single click on the joystick button, the camera automatically moves back to its home position. If the mode is switched, the joystick can also be used as a mouse, which allows an easy menu control. VMC touch The touch screen enables a simple and convenient multi-touch control. The intuitive user interface allows the security operator for instance to activate live streams or to control PTZ cameras precisely. Furthermore, the playback of recordings and the initiation of backups can be controlled conveniently. In addition, an enhanced snapshot function can be used for individual marks and comments directly in the image. VMC jog-shuttle The jog-shuttle is ideally suited to find certain frames in a video sequence quickly. By rotating the central jog-dial, the security operator can conveniently move through individual frames. Using the shuttle-ring surrounding the jog-shuttle, the scenes can subsequently be replayed forward or backward at different speeds.Add to Compare
The Lilin NVR-KIT112 IP camera kit combines four indoor-use mini-dome HD cameras with Lilin's free CMX recording software, allowing you to monitor and record up to 36 camera channels. CMX can record in high-quality HD 720p resolution, and has basic point-of-sale integration, making this package an ideal retail security starter kit. The cameras in this kit sport a discreet dome design and a 3-axis gimbal allows them to be easily installed and adjusted.Add to Compare
The Lilin NVR-KIT712 outdoor IP camera kit contains four Lilin 712S HD network cameras along with Lilin’s CMX recording software. Each camera can be recorded in HD 720p resolution for clear, crisp video and comes with built-in infrared LEDs with an illumination range of 16m and a switchable infrared-cut filter to allow recording even in total darkness. IP66-rated aluminium housings protect the cameras from damage during harsh weather conditions, making this kit ideal for continuous surveillance and recording of outdoor areas.Add to Compare
LILIN NVR-KIT312 is a professional 4 Camera IP System consisting of the 4 x Lilin IPR-312ESX external day night IP Cameras and Lilin's CMX 16 Camera NVR Software. It is ideal for most commercial security applications. The cameras in this kit come with a built in 3-9mm vari-focal lens. Put simply, this enables you to manually adjust the viewing angle of the camera when you install it. In this case you could adjust it from approx 62 degrees (widest angle) to approx 21 degrees.Add to Compare
Browse CCTV Observation Kits
CCTV observation system products updated recently
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025. A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring. Why engineers should be using IoT technology in product design The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it. Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security. Ways to use IoT in the development process Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them. Improving connectivity IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial. The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products. Suggested solutions To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff. Helping comply with regulations When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses. Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business. Suggested solutions By testing the IoT device design and components early, engineers can address any pre-compliance issues that may arise. During the early stages of development, we suggest using scalable and automated test systems readily available in the marketplace. Improved communication with other devices New challenges arise as new devices hit the market and existing technologies are redesigned to offer a better experience In the rapidly growing number of connected devices, new challenges will arise as new devices hit the market and existing technologies are redesigned to offer a better user experience. This rapid growth in devices will lead to congested networks leading to the necessity of devices being able to function in the midst of increased traffic and interference. Failure to do this will lead to delayed responses which could prove to be fatal. Suggested solutions The best solution for this issue is found in the evaluation process and supporting test methods that the Institute of Electrical and Electronics Engineers (IEEE) published in the American National Standard for Evaluation of Wireless Coexistence (ANSI). This process addresses the interconnectivity issues present in radio frequency environments. The outlined process involves defining the environment and evaluating the wireless performance of the equipment through thorough testing. An in-depth version can be found in its entirety online. Increasing the longevity of devices IoT devices are being used in vital industries such as healthcare and automotive so battery life and power consumption are two challenges that engineers must take seriously. A failure in this area could potentially lead to loss of life or safety concerns on the road. As new firmware and software are being designed to address these factors, engineers must be implementing them into IoT devices with the ability to be continually updated. Suggested solutions Longevity should be addressed in all aspects of the design process and tested thoroughly using a wide range of currents. By doing this, an engineer can simulate consumer applications to best predict performance. Security Security and privacy are concerns with any technology, but with the use of IoT in medical devices, it’s paramount Security has been a controversial issue for IoT since its inception. Security and privacy are concerns with any technology, but with the widespread use of IoT in medical devices, smart home appliances, and access control and surveillance, it’s paramount. For example, medical devices may store information about health parameters, medications, and prescriber information. In some cases, these devices may be controlled by an app, such as a smart pacemaker, to prevent heart arrhythmias. Naturally, a security issue in these devices could be devastating. Another example of dangerous security concern is with surveillance cameras and access control, such as for home or business security systems. These intelligent door locking systems contain locks, lock access controllers, and associated devices that communicate with each other. Suspicious activities are flagged with alerts and notifications, but if a hacker gains access, it can lead to real-world, physical danger. Security design points Here are some key points for security design: Physical security: IoT devices may be in external, isolated locations that are vulnerable to attack from not only hackers but by human contact. Embedding security protection on every IoT device is expensive, but it’s important for general security and data safety. Security of data exchange: Data protection is also important because data gets transmitted from IoT devices to the gateway, then onto the cloud. With surveillance and access control information or sensitive medical information, and encryption is vital to protecting data from a breach. Cloud storage security: Similar to data exchange, the information stored in medical devices, surveillance and access control systems, and some smart appliances with payment features, must be protected. This includes encryption and device authentication through access control, which can police what resources can be accessed and used. Update: Security vulnerabilities will always occur, so the key to addressing them is having a plan to address errors and release patches. Customers should also have options to secure devices quickly and effectively. Suggested solutions Engineers can include security and protection into IoT devices with early and perpetual testing throughout the design process. Most security breaches occur at endpoints or during updates, giving engineers a starting point for how to address them. Creating more secure devices Ensuring the security of connected devices should be of supreme importance for engineers as these devices are vulnerable to security breaches. The ultimate security of devices goes beyond the scope of engineering as the network and enterprise levels must also be secure to protect against potential threats. However, engineers play a role in this protection as well and should consider device security in the design process. Suggested solutions On a device level, engineers can help protect IoT devices from vulnerabilities by implementing early testing and continuing it throughout the design process. Most security transgressions occur at endpoints so this continual testing can, and should, create barriers to breaches. Regulations and compliance For IoT engineers, the complex web of regulations and compliance standards present new challenges Regulations and compliance surrounding data and technology are nothing new, but for IoT engineers, the complex web of regulations and compliance standards present new challenges. Engineers are already addressing obstacles in security and connectivity, all while meeting deadlines, and working around regulations adds time and expense to the process. Unfortunately, a failure to comply with global, regional, or local laws can lead to setbacks and fines. In addition to time lost in production and possible fines, the damage to a company’s reputation can lead to even more losses. Suggested solutions Compliance should be considered early and often in the design process. In the early stages of development, the IoT device or components can be tested to address and compliance issues. If possible, use a scalable and automated test system. The comprehensive solution As we stare at an uncertain future full of possibilities, it’s clear to see that new challenges will continue to be presented as technology evolves and new innovative devices are designed by engineers. By addressing these issues early and often, solutions can be implemented and problems prevented before they even have a chance to occur thanks to sound engineering and solid design.
The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and centre on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol. This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilising system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralised location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.
Related white papers
The borderless control room
Monitoring traffic flow: Everywhere, all the time
Six things to look for when adding AI cameras to your operation
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download