Dallmeier CCTV Observation Kits (1)
The VMC-2 Dallmeier offers a new Video Management Centre with touch screen for the convenient and intuitive control of video systems. The Video Management Centre VMC-2 stands out due to its ergonomic and intelligent design. It is made up of a touch screen, a joystick and a jog-shuttle. The individual components are modular and flexible, i.e. they are freely positionable and thus ideally suited for both left- and right-handed operators. Moreover, it is possible to use the components independently as stand-alone devices. The VMC-2 is compatible with SeMSy® III video management systems and is DIN EN 50130-4 compliant. VMC joystick By using the joystick, the security operator is able to control movable cameras conveniently. Pan, tilt and zoom movements can be carried out intuitively. With just a single click on the joystick button, the camera automatically moves back to its home position. If the mode is switched, the joystick can also be used as a mouse, which allows an easy menu control. VMC touch The touch screen enables a simple and convenient multi-touch control. The intuitive user interface allows the security operator for instance to activate live streams or to control PTZ cameras precisely. Furthermore, the playback of recordings and the initiation of backups can be controlled conveniently. In addition, an enhanced snapshot function can be used for individual marks and comments directly in the image. VMC jog-shuttle The jog-shuttle is ideally suited to find certain frames in a video sequence quickly. By rotating the central jog-dial, the security operator can conveniently move through individual frames. Using the shuttle-ring surrounding the jog-shuttle, the scenes can subsequently be replayed forward or backward at different speeds.Add to Compare
Browse CCTV Observation Kits
CCTV observation system products updated recently
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025. A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring. Why engineers should be using IoT technology in product design The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it. Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security. Ways to use IoT in the development process Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them. Improving connectivity IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial. The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products. Suggested solutions To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff. Helping comply with regulations When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses. Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business. Suggested solutions By testing the IoT device design and components early, engineers can address any pre-compliance issues that may arise. During the early stages of development, we suggest using scalable and automated test systems readily available in the marketplace. Improved communication with other devices New challenges arise as new devices hit the market and existing technologies are redesigned to offer a better experience In the rapidly growing number of connected devices, new challenges will arise as new devices hit the market and existing technologies are redesigned to offer a better user experience. This rapid growth in devices will lead to congested networks leading to the necessity of devices being able to function in the midst of increased traffic and interference. Failure to do this will lead to delayed responses which could prove to be fatal. Suggested solutions The best solution for this issue is found in the evaluation process and supporting test methods that the Institute of Electrical and Electronics Engineers (IEEE) published in the American National Standard for Evaluation of Wireless Coexistence (ANSI). This process addresses the interconnectivity issues present in radio frequency environments. The outlined process involves defining the environment and evaluating the wireless performance of the equipment through thorough testing. An in-depth version can be found in its entirety online. Increasing the longevity of devices IoT devices are being used in vital industries such as healthcare and automotive so battery life and power consumption are two challenges that engineers must take seriously. A failure in this area could potentially lead to loss of life or safety concerns on the road. As new firmware and software are being designed to address these factors, engineers must be implementing them into IoT devices with the ability to be continually updated. Suggested solutions Longevity should be addressed in all aspects of the design process and tested thoroughly using a wide range of currents. By doing this, an engineer can simulate consumer applications to best predict performance. Security Security and privacy are concerns with any technology, but with the use of IoT in medical devices, it’s paramount Security has been a controversial issue for IoT since its inception. Security and privacy are concerns with any technology, but with the widespread use of IoT in medical devices, smart home appliances, and access control and surveillance, it’s paramount. For example, medical devices may store information about health parameters, medications, and prescriber information. In some cases, these devices may be controlled by an app, such as a smart pacemaker, to prevent heart arrhythmias. Naturally, a security issue in these devices could be devastating. Another example of dangerous security concern is with surveillance cameras and access control, such as for home or business security systems. These intelligent door locking systems contain locks, lock access controllers, and associated devices that communicate with each other. Suspicious activities are flagged with alerts and notifications, but if a hacker gains access, it can lead to real-world, physical danger. Security design points Here are some key points for security design: Physical security: IoT devices may be in external, isolated locations that are vulnerable to attack from not only hackers but by human contact. Embedding security protection on every IoT device is expensive, but it’s important for general security and data safety. Security of data exchange: Data protection is also important because data gets transmitted from IoT devices to the gateway, then onto the cloud. With surveillance and access control information or sensitive medical information, and encryption is vital to protecting data from a breach. Cloud storage security: Similar to data exchange, the information stored in medical devices, surveillance and access control systems, and some smart appliances with payment features, must be protected. This includes encryption and device authentication through access control, which can police what resources can be accessed and used. Update: Security vulnerabilities will always occur, so the key to addressing them is having a plan to address errors and release patches. Customers should also have options to secure devices quickly and effectively. Suggested solutions Engineers can include security and protection into IoT devices with early and perpetual testing throughout the design process. Most security breaches occur at endpoints or during updates, giving engineers a starting point for how to address them. Creating more secure devices Ensuring the security of connected devices should be of supreme importance for engineers as these devices are vulnerable to security breaches. The ultimate security of devices goes beyond the scope of engineering as the network and enterprise levels must also be secure to protect against potential threats. However, engineers play a role in this protection as well and should consider device security in the design process. Suggested solutions On a device level, engineers can help protect IoT devices from vulnerabilities by implementing early testing and continuing it throughout the design process. Most security transgressions occur at endpoints so this continual testing can, and should, create barriers to breaches. Regulations and compliance For IoT engineers, the complex web of regulations and compliance standards present new challenges Regulations and compliance surrounding data and technology are nothing new, but for IoT engineers, the complex web of regulations and compliance standards present new challenges. Engineers are already addressing obstacles in security and connectivity, all while meeting deadlines, and working around regulations adds time and expense to the process. Unfortunately, a failure to comply with global, regional, or local laws can lead to setbacks and fines. In addition to time lost in production and possible fines, the damage to a company’s reputation can lead to even more losses. Suggested solutions Compliance should be considered early and often in the design process. In the early stages of development, the IoT device or components can be tested to address and compliance issues. If possible, use a scalable and automated test system. The comprehensive solution As we stare at an uncertain future full of possibilities, it’s clear to see that new challenges will continue to be presented as technology evolves and new innovative devices are designed by engineers. By addressing these issues early and often, solutions can be implemented and problems prevented before they even have a chance to occur thanks to sound engineering and solid design.
The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and centre on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol. This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilising system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralised location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.
The Prague city administration together with the Criminal Investigation Department relies on security technology from Germany-based Dallmeier in Prague's Wenceslas Square, one of the largest city squares in Europe with an area of 45,000 square metres, and the Old Town Square. Wenceslas Square and Old Town Square in Prague are both steeped in history, and now as ever before remaining important hubs for tourism and traffic. To ensure the safety of the streams of people and vehicles in these places, when it comes to security equipment the Prague city administration relies on a combination of conventional cameras and a solution from the Regensburg company Dallmeier. From horse market to commercial thoroughfare Wenceslas Square in Prague was created in the 14th century and originally served as a horse market, as was reflected in its name. It was renamed "Wenceslas Square" in 1848 in tribute to Saint Wenceslas of Bohemia. Since the 19th century, the function of the square has evolved from that of a place for trading horses to a busy commercial district. The function of the square has evolved from that of a place for trading horses to a busy commercial district It is used by pedestrians, cyclists, motor vehicles, and local public transport alike, and so constitutes a major confluence point in Prague's New City. The city administration attaches great importance to ensuring that all these traffic elements can coexist in harmony, and to have a general overview of what is happening, the administration together with the police criminal investigation department rely on the sharp "eyes" of the Panomera®. Tourist magnet Old Town Square Panomera® also provides security in the 9000 square metre Prague Old Town Square. The Old Town Square is the historic heart of the city and attracts thousands of tourists every year with its atmosphere, sights, and markets. Its history dates to the 11th century, and it has always been a crossroads for commerce and a marketplace. It is a magnet for tourists and its borders abound with restaurants, museums, galleries, and shops. The astronomical clock on the tower of the Old Town Hall is one of the most well-known sights in Europe. Advantages of Panomera® technology for monitoring The solution for both Wenceslas Square and Old Town Square consists of Panomera® models from the Topline series. The Panomera® multifocal sensor system can provide coverage for vast expanses and areas. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points The advantage: The combination of general overview with the highest possible resolution of details is very important, particularly for large squares, and with this camera technology more remote objects can also be displayed with the same resolution as objects in the image foreground. Several operators can zoom into the same image at the same time. Even then, the overall scene always remains in view and the recording continues. Where previously several megapixel cameras would have been needed, the users' workload has been reduced significantly, because fewer images must be captured. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points are needed. For customers, this means savings not only in terms of infrastructure but also regarding operation and management, so total operating costs are reduced. Planning that delivers In the project planning phase, the Dallmeier 3D specialist team consisting of engineers and graphic designers created a three-dimensional simulation of the customer's environment. In the 3D model, the team simulated the real camera models and locations/installation sites, and thus also angles of vision and ranges. The completed 3D model was presented to the customer jointly with integration partner KH Servis in Prague and comprised the entire solution including the cameras and other essential components. The city administration and police authorities were delighted by this manner of project visualisation because this approach also allowed an accurate calculation of costs to be made, giving the customer certainty regarding the cost and scope of the project. "What we plan is what you get" 3D planning also guarantees that there are no surprises either on the technical or financial level 3D planning also guarantees that there are no surprises either on the technical or financial level during or after the installation. Dallmeier calls this approach "What we plan is what you get". Besides the technical advantages delivered by Panomera®, the customers were also impressed by the planning certainty they were given by the 3D visualisation, and, at the end of 2017, Dallmeier won the order to put the project into practice. Test run at the Dallmeier FAT Centre Before it was installed, the planned solution underwent a Dallmeier Factory Acceptance Test at the FAT Centre in Regensburg. All components were assembled there, and the final environment was tested in live operation. While testing was proceeding in the FAT Centre, KH Servis was also attending training in Regensburg so they would be ready for the on-site installation and so they could see the system operating flawlessly for themselves. Observation and intervention With the installation of the multifocal sensor systems, the desire for increased security and more effective intervention capabilities was realised. The cameras are used to observe situations and when necessary, enable rapid countermeasures or also a rapid investigation of incidents. In the event of criminal offences, the video material can be stored separately as evidence. Special challenge: Protection of historic monuments Permission had to be obtained from the building owners before the cameras could be mounted Both squares are bordered by buildings with historic monument status, the Panomera® cameras could not always be mounted where single sensor cameras had hung previously, enabling the "old" installation points to be used. Permission had to be obtained from the building owners before the cameras could be mounted, but this was managed successfully for all the new installation points. Conclusion The conclusion by KH Servis, Dallmeier's integration partner in Prague, "We worked together with extreme professionalism, the city administration and police authorities were ultimately convinced, not only by the quality of the systems and the image material but also the impressive planning phase and planning certainty it gave them."
The topic of airport security is assuming more and more prominence in Russia, and Yuzhno-Sakhalinsk airport is no exception, relying on an apron and runway surveillance solution using Panomera® camera technology from the German-based solution specialist Dallmeier. Just under 7000 km as the crow flies from Moscow is the largest airport on the Russian island of Sakhalin – Yuzhno-Sakhalinsk airport. It was awarded the status of International Airport by the International Civil Aviation Organization (ICAO) in 1990, and with about 1 million passengers per year, it is the largest airport on the island. Latest development standards Generally, these days, it is difficult to imagine airports without security measures. This is especially true for airports which are entitled by certification of the ICAO to call themselves ‘International’. The ICAO defines principles and guidelines for civil aviation. To receive certification, airports are obliged to adopt arrangements in keeping with the ICAO statutes for maintaining measures including but not limited to video security – such as for the apron and runway – and to implement corresponding solutions. The operators at Yuzhno-Sakhalinsk Airport extended video surveillance to include the apron and runway areas In this context, the airport operators must also constantly take stock of advances and the latest development standards in the related technologies. To satisfy these requirements, the operators at Yuzhno-Sakhalinsk Airport extended video surveillance to include the apron and runway areas. The use of the most up-to-date security equipment is intended to ensure the safe, expeditious and orderly movement of aircraft on the aprons and runway. Special camera systems These security areas are only accessible for authorised personnel, but the operators must still ensure that all activities relating to the aeroplane, such as the presence of unauthorised persons on site, or any damage incidents can be investigated quickly. Visual verification of all processes is assured by a Dallmeier Security solution based on the patented Panomera® multifocal sensor technology. These special camera systems offer uninterrupted tracking of activities in large spatial relationships with uniform image quality despite the distance differences which apply for both the runway and the apron. The Dallmeier software technology enables operators to receive the overview images from the Panomera® in one image and depending on the demands of the situation to select one or multiple zoom areas in the overall image with just a few clicks of the mouse, which they can examine closely as if they were in PTZ mode. Reasonable human resources A single Panomera® system replaces many PTZ and megapixel cameras But opposed to traditional PTZ-cameras, a high-resolution total overview of all other areas is always preserved both in the live mode and in the recording. Thus, all processes relating to the aircraft whether it is arriving, departing, or even parking, such as refuelling, maintenance or cleaning, can be supervised seamlessly and recorded permanently within high resolution. A single Panomera® system replaces many PTZ and megapixel cameras. For the operators of the airport, this has several financial advantages, since it entails considerably reduced expenditure on infrastructure, the cost of camera management is reduced by a correspondingly substantial factor, and the objective can also be achieved with reasonable human resources. Allowing several operators The smart operation of the Dallmeier VideoIP-Client software from the workstation both in live mode and in playback mode enables the operator to analyse the recordings quickly and conveniently. One particularly important advantage is derived from the capability to allow several operators to access zoom areas at the same time without ever losing the general overview. Thus, for example in the event of a security alert, the police can use the camera system Thus, for example in the event of a security alert, the police can use the camera system, but at the same time the apron controllers still retain a full view, and even service companies can continue to use the camera views undisturbed. IT Director Dmitry Golovanov and Project Manager Renat Mardanov are highly satisfied with the Dallmeier Airport solution. Multifocal sensor technology "Another important factor was the stability and reliability of the system because we must record the entire situation permanently to ensure optimal loss and safety management and for investigating incidents. The multifocal sensor technology enables us to zoom into detail situations at any time, even in the recorded image data, and verify any occurrences with certainty.” “The Dallmeier Panomera® has already been deployed successfully in many international airports, so it was not difficult for us to reach a decision after we were able to convince ourselves of the systems' quality.", recounts Dmitry Golovanov, "Even the considerably smaller number of cameras compared with solutions using PTZ and megapixel cameras made installation and operation much simpler for us, which in turn helps to relieve the burden on our processes and lower total costs." Currently installed systems Analysis tools and business process optimisations are topics which will become increasingly important Project Manager Renat Mardanov adds to his colleague's statement: "The execution of the project was flawless, the thorough training of our installers and support during implementation and setup of the entire system on site ensured that we could go live rapidly and without problems, and in Dallmeier we have found the right solution partner for a complete implementation of our new security solution." Analysis tools and business process optimisations are topics which will become increasingly important for the airport in the future. They can set their own schedule since the currently installed systems are scalable in all directions at any time and will remain fit for purpose in the future. An implementation of a wide range of tools, such as an upgrade to AI-based instruments and analysis functions is also possible at any time in the future.
With immediate effect, the patented Panomera multi-focal sensor cameras, produced by Germany-based manufacturer, Dallmeier (Dallmeier electronic GmbH & Co.KG), have completed a seamless integration in the Milestone XProtect video management software (VMS). Panomera - Xprotect VMS The integration provides Milestone XProtect users with a range of entirely new capabilities, for observing and monitoring large areas, and vast spatial contexts. With Panomera, the images from up to seven detailed sensors and one overview sensor are intelligently stitched within a camera system, to produce one overall vision of the object space. XProtect operators can now open and organise all ‘sub-modules’ from the XProtect Smart Client user interface, drag and drop, and zoom into any number of areas within the sub-modules, simultaneously. Enabling the entire high-resolution image at all times provide the benefit equal to combining a powerful megapixel camera, with an unlimited number of high-resolution ‘virtual’ PTZs. ‘Virtual PTZ’ feature The number of cameras needed and the number of screens available to observe are reduced drastically The plugin works with the XProtect Smart Client process seamlessly. It eliminates complicated, confusing switching between camera perspectives and the unnecessary search for maps of buildings, and surroundings. The number of cameras needed and the number of screens available to observe are reduced drastically. The work of the operators is made considerably simpler. All sub-modules are recorded in high resolution. The zooms are carried in extremely high resolution, allowing the operator to receiving details of the entire image. This feature is not possible with conventional solutions, and it is beneficial when dealing with complex situations, for example, or for ensuring successful forensic analysis. Integration of Panomera technology “The integration of Panomera technology in the Milestone XProtect software is an important step for our mutual customers and partners. Creating an unlimited number of high-resolution views from the main image within the VMS and recording them is not possible in this form except with Panomera. It is as if the user has an unlimited number of 'virtual PTZs' at his disposal, while at the same time everything is continuously recorded in high resolution,” said Thomas Dallmeier, Member of the Management Board at Dallmeier. Thomas Dallmeier adds, “With this combined solution, not only do users of Milestone XProtect reduce their overall operating costs, as fewer camera systems and less infrastructure are needed, but they also significantly improve overall security, including the documentation of incidents, since all concerned areas of the object space are monitored and recorded in high resolution.” Technologies for video security applications “We are delighted with the integration of the Panomera technology in the Milestone XProtect video management software. As a result, our joint customers have at their disposal, absolutely ‘state-of-the-art’ technologies, from both the software and the camera perspective, for an enormous range of video security applications,” said Alberto Bruschi, Manager EMEA Community Sales at Milestone Systems. Alberto adds, “We are particularly pleased that Dallmeier and Milestone Systems are European manufacturers, whose key technologies are combined to create an efficient, scalable, and reliable solution. From the perspective of cyber security, the high standards for secure technologies are becoming more and more important for many of our customers.”
Related white papers
The borderless control room
Monitoring traffic flow: Everywhere, all the time
Six things to look for when adding AI cameras to your operation
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Connected video technology for safe citiesDownload
Webcast: Access control integration increases security while reducing costsDownload
The Panomera® multifocal sensor system from Dallmeier watches over the Wenceslas Square and Old Town Square in Prague
- The Panomera® multifocal sensor system from Dallmeier watches over the Wenceslas Square and Old Town Square in Prague
- Genetec helps London property estate enhance brand reputation
- Dahua Technology supports European research and innovation programme
- Custom Consoles SteelBase and MediaWall maintain public safety at Middle East Museum