CCTV Storage System / HDD(504)
IDIS has launched the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and Smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy. The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market-responsive innovation and meets installer and end-user requests for a more compact 360° camera that can capture high-definition images in all lighting conditions without blind spots. It also lets customers to benefit from heat mapping without the hassle and cost of additional appliances or analytics software. A broad, high-specification camera, in a compact form, the new Super Fisheye 5MP builds on the success of earlier IDIS’s Super Fisheye cameras, including the award-winning 12MP DC-Y3C14WRX. It meets industry demands for clear and accurate image capture, long-term performance and reliability, exceptional de-warping, and a low total cost of ownership. “The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance and is already contributing to successful project wins for our integration partners in retail applications, eating-out sectors, education, healthcare and other environments where customers benefit from cost-effective and simple to use analytics. “Its high performance 360° capability means it can replace multiple fixed-lens cameras and provide complete and clear image capture in a variety of lighting conditions. For our integrator partners, IDIS’s value proposition, fast and seamless installations and performance guarantees have the potential to increase margins, while end-users benefit from savings in terms of lower upfront equipment and installation costs, with reduced maintenance expense and video storage burden,” said James Min, Managing Director, IDIS Europe. The IDIS 5MP IR Compact Fisheye features include: IDIS Smart UX Controls for very high accuracy and ease-of-use, with intuitive “rubber-band” style control to deliver a new level of operator experience. Super smooth de-warping on the camera as well as on desktop applications and mobile devices for added convenience and out-of-hours monitoring. Quick Controls allowing operators to use the CTRL button with a combination of left, right, and wheel mouse clicks for easier and faster investigations. Full protection against video loss thanks to built-in IDIS Smart Failover guaranteeing continued recording in the event of network instability, overload or failure. IDIS Intelligent Codec that delivers H.264/H.265 dual codec performance and significant bandwidth and storage savings, while eliminating the need to upgrade hardware. Quick and simple installation with DirectIP NVRs and true plug-and-play functionality. Reduced potential for cybersecurity loopholes with one-click configuration eliminating the need to manage individual passwords for multiple devices. Heat-mapping to more easily identify hot-spots, dead zones and bottlenecks in retail and eating-out sectors. Intelligent video and event trigger functions including motion detection, active tampering and trip zones. “The IDIS Super Fisheye 5MP Compact camera also scores highly on essential features including, built-in LEDs for IR operation in full darkness (up to 15m); 8 zone privacy masking; true wide dynamic range; ONVIF support; built-in speakers and microphone allowing 2-way communications; industry-leading 5-year free warranty. All these factors come together to deliver a lower cost of ownership to our customers,” continued James Min. IDIS offers an end-to-end, single sourced video offering that delivers unrivalled plug-and-play simplicity, combined with highest-quality performance, compatibility, and a low total cost of ownership and features industry-leading warranties. IDIS will be demonstrating its Super Fisheye range and Total Solution line up12 at IFSEC International on 18-20 June at ExCeL, London, UK.
Dahua AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc.The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System OverviewPro AI series contains Face Capture, Perimeter Protection and People Counting functions. Powered by deep-learning Artificial Intelligence algorithms, significantly improved accuracy. Active Deterrence and Full Colour camera are also in this series. Meanwhile, the series features starlight and smart IR technology. This series fully protected from dust and water, certified to IP67 standard. Functions Perimeter ProtectionDahua’s Perimeter Protection functions significantly improved accuracy. Perimeter Protection reduces false alarms and decreases pixel count requirements for object detection. Perimeter Protection features custom tripwires based on object type for automation in limited access areas such as pedestrian or vehicle-only zones. This combination of advanced AI analytics and real-time alerts to a desktop or to a mobile client reduces system requirements and resources resulting in greater surveillance system efficiency. People CountingPeople Counting function uses advanced image processing technology to capture depth information from within images. The camera pairs this information with deep learning algorithms to analyze and detect human bodies and track target objects in real time. The camera provides statistics for separate individuals’ entrance and exit with up to 95% counting accuracy. MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Dahua face detection camera can extract six facial attributes and output the metadata for analysis. ePoE technologyThe ePoE technology of Dahua, designed internally, adopts advanced 2D-PAM3 coding modulation from physical layer, and realizes full duplex transmission over 800 meters at the speed of 10Mbps, or 300 meters at the speed of 100Mbps via Cat 5 or coaxial cable media. Besides, it supports PoE and PoC power supply technology which has greatly simplified construction and wiring. Dahua ePoE technology offer a new way to accomplish long distance transmission between IP camera and network switch. It allows more flexible surveillance system design, improves reliability and saves construction and wiring cost. Protection(IP67, wide voltage)The camera allows for ±30% input voltage tolerance, suitable for the most unstable conditions for outdoor applications. Its 6KV lightning rating provides effective protection for both the camera and its structure against lightning. Subjected and certified to rigorous dust and immersion tests (IP67) , the camera is the choice for installation in even the most unforgiving environments.
The Contera NVR Appliance from Arecont Vision Costar is designed to offer powerful IP recording in an affordable, compact chassis. The Contera NVR Appliance is equipped with an on-board 8 or 16 channel PoE switch, that can be upgraded to 24 channels, allowing for Plug and Play connection with ConteraWS® or ONVIF cameras. With full integration to ConteraWS® Web Services, the Contera NVR Appliance offers centralised user management, single sign-on convenience, mobile apps and a web client that allows for easy remote connection to your recorders. Network setup is fast and easy using ConteraWS® Web Services, and eliminates the need for port forwarding or DDNS. The Contera NVR Appliance runs on a secure Linux OS and comes preloaded with ConteraVMS® Server software as a turnkey solution.
March Networks’ new ME3 Pendant IR PTZ camera delivers uncompromising security for large indoor and outdoor spaces, as well as essential features to ensure high reliability, clear image capture and storage efficiency. Ideal for large-footprint environments such as parking lots, big box stores and transit stations, the camera incorporates electronic image stabilisation and HDR, so recorded video is always crisp. Universal Power over Ethernet (UPoE) ensures redundancy and zero downtime by switching to PoE when a camera loses power. And built-in PTZ auto-tracking uses motion detection to automatically track a person or object, keeping the image centred and in focus. Software updates are quick and easy to apply using the mass management feature available in Command Enterprise software, while PTZ-optimised motion histograms speed search capabilities. The 3MP PTZ includes a 40x zoom lens to capture objects 25% further away than industry-standard PTZs, and IR LEDs for uniform illumination in total darkness at a distance of more than 650 feet/200 metres. It also incorporates a Low Bit Rate compression mode to improve bandwidth and storage efficiency by as much as 50% when the camera is in its home position. The ME3 Pendant IR PTZ is protected by a weather-proof enclosure, and generates an alert in the event someone attempts to obstruct or move the camera. It comes with a variety of mounting options, including a 1.5” NPT wall mount and short pendant mount, both with back boxes.
VIVOTEK’s FE9391-EV is the next generation of market-leading 12-Megapixel 360° panomorph network camera, featuring a detailed 12-Megapixel CMOS sensor which guarantees superb image quality. Utilising the latest in panomorph lens technology for 180° panoramic view (wall mount) or 360° surround view (ceiling/wall/floor mount) with zero blind spots, the camera is able to provide comprehensive coverage of open areas such as airports, shopping malls, parking lots, retail stores, offices and more. Removable IR-cut filter The FE9391-EV (IP66, IK10 rated) is the successor to FE8391-V in the VIVOTEK 360° surround view family. The new model is equipped with a removable IR-cut filter and WDR Enhancement technology, allowing the camera to maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. 3D Noise Reduction technology enables the camera to capture clear, polished video under low-light conditions. Latest in IR illumination The FE9391-EV's use of the latest in panomorph lens technology has led to much improved image quality with a huge drop in edge distortion. The FE9391-EV is also updated with the latest in IR illumination, VIVOTEK's Smart IR II technology with Adaptive IR. Adaptive IR enables the FE9391-EV's IR illuminators to adjust to the scene together or individually to provide the best possible IR image, reducing glaring hotspots and/or underexposed dark spots. Advanced Video Content Analysis The FE9391-EV is also be the first to include a new wave of advanced Video Content Analysis (VCA). Available in 4Q 2017, this includes better object detection in order to reduce false alarms. Through advanced Video Content Analysis functions including crowd detection features the FE9391-EV is the next steps in elevating surveillance cameras from image capturing devices to advanced notification instruments, allowing users to see more in smarter ways.
System OverviewThis PIR model is an indoor/outdoor dual detection camera which uses both video and infrared sensor to achieve accurate motion detection functionality. It also supports active deterrence feature which warns off intruders with white light and siren even before users are aware of the incident. This camera is an ideal choice for applications which require intrusion protect and video verification , such as courtyards, offices, warehouses, stores, etc. Functions 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the HCVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility.* Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 700m transmission for 5MP HD video via coaxial cable, and up to 300m via UTP cable.**Actual results verified by real-scene testing in Dahua's test laboratory. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analog surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional ana-log system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network. Dual DetectionThe detection accuracy is well guaranteed with both motion detection and PIR detection, which can eliminate the number of false alarms you receive. With the advantage of dual detection technology, your HDD will now last longer and not be recorded with false alarms. Gone are the days of alarms caused by heavy wind or rain. Instead, only true threats will instantly trigger an alarm and allow you to protect your loved ones. Active DeterrenceActive deterrence is to warn off intruders actively with white light and siren even before users are aware of the incidence. Once an intursion is detected, the white light will turn on and the siren will buzzer to alert the intruder. The white light can be set to Normally on or Flash, the content of siren is configurable. StarlightWith the adoption of large sized high performance sensor, the camera is able to provide incomparable performance even under extreme lowlight environment. The starlight feature allows more details to be captured and accurate color to be recognized at night or in scenes with limited illumination. Smart IRThe camera is designed with array LED IR illumination for best lowlight performance. Smart IR is a technology to ensure brightness uniformity in B/W image under low illumination. Dahua’s unique Smart IR adjusts to the intensity of camera's infrared LEDs to compensate for the distance of an object, and prevents IR LEDs from overexposing images as the object come closer to the camera. ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design.The camera is protected against water and dust with IP67, making it suitable for indoor or outdoor environments.With PIR working temperature range of -20 °C to +60 °C (-4 °F to +140 °F), the MotionEye is designed for extreme temperature environments. Supporting ±30% input voltage tolerance, this camera suits even the most unstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects of lightning.
In Mirasys VMS Version 8 particular attention has been paid to security and privacy. Also, pre-existing familiar product features such as audit trail and versatile material management and search functionality brings significant benefits, for example, for the new EU General Data Protection Regulation (GDPR) requirements. Mirasys V8.4 is also a foundation for totally new opportunities related to this; what comes to system management and usage reporting, for example. Functional effectiveness Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. The Mirasys VMS V8 modern Spotter for Windows user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. The new HTML5 (Hypertext Markup Language, Version 5) based user interface in V8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Integration with other systems Video management systems are also more and more frequently integrated with other systems such as building management or access control. Video feeds will in the future also often be a replacement for on-site visits or tours by personnel. This reduces operational costs for security and building maintenance. User interfaces Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system no longer has an actual upper limit. Mirasys VMS V8 is the answer to the scalability and performance needs of new camera technologies from any manufacturer. Thus, the video management system can be designed freely using the best equipment for the customer-specific requirements, and can also support all future needs. User-specific requirements As video management evolves, traditional command and control (monitoring) services also change. In addition to security monitoring, this will also involve monitoring other systems (building management, access control, fire alarms, or even manufacturing, logistics and operational systems or processes). More and more often these are done by a service provider, and not the organisation whose premises, systems or processes are monitored and/or managed. Further, systems today have more and more different types of users; and variation in user skills or access rights can be significant. This leads to individual, user-specific requirements for system access and use, while simultaneously requiring that the users must be able to access the system from different locations and using different devices. Versatile possibilities and efficiency of management For systems integrations and management, Mirasys VMS Version 8.4 brings new and more versatile possibilities with its new HTTP based Application Programming Interface (API). A particularly significant benefit is that the HTTP API allows also for automation of the system configuration and management. The new HTTP API provides modern REST-compliant (Representational State Transfer, or ”RESTful”) web services which allow requesting systems to access and manipulate textual representations of web resources using a uniform and predefined set of stateless operations from any platform (almost any operating system and practically any programming language). Version 8.4 also brings a new software licensing model that brings remarkable simplification, effectiveness and cost savings, because from V8.4 onwards every server no longer requires its own server-specific software license, but all the software and licence features and limits (such as number of cameras, number of servers, number of simultaneously logged in users or any other functions) can, in any size system, be managed through a single system-wide software licence controlled via the system’s Management servers. The new V8.4 licences are also no longer dependent on the server’s MAC (Media Access Control) address, but uses a multi-factor “License Protection Key” that remains valid even if the hardware system has to be changed (e.g., new or replacement NIC, Network Interface Card, or new or replacement graphics controller, etc).
The Evolution Stainless Steel cameras, part of Oncam’s Specialist Camera Range, are unique to the 360-degree video surveillance market as they are the only ones certified for tough environments, indoor and outdoor. The 05MP and 12MP versions have been specifically designed to meet the needs of customers operating in demanding environments such as Food Processing, Industrial, Maritime and Ports and Safe City applications. The cameras’ resilient Stainless Steel 316 housing is manufactured for enhanced corrosion resistance. The IP66, IP67, IP68, IP69K, and NEMA 4X and 6P ratings make the enclosure fit for harsh environments, while its IK10+ rating makes it resistant to impacts of 40 joules. The NSF certification and HCV EU mark make the camera range unique, guaranteeing compliance with standards for commercial food equipment in both North America as well as Europe. The only 360-degree fisheye camera in a stainless steel housing, Oncam’s new and improved camera range is available for surface and pendant mount installations. A matching stainless steel arm allows for wall, corner and pole mounting. Evolution 05 Stainless Steel: EVO-05-SS2 Evolution 12 Stainless Steel: EVO-12-SS2
System OverviewDahua Technology, a world-leading video-centric smart IoT solution and service provider, debuted its new XVR series, XVR5000-I/XVR7000-4KL-I featuring full-channel SMD Plus to benefit customers from AI upgrade. The series are designated to reduce false-alarm rates and human surveillance costs, thus bringing great value to customers in search of products with accurate human/vehicle alarm to raise the security level of various indoor and outdoor facilities. Renovated from the original SMD technology running on CPU, the new SMD Plus adopts independent AI smart chip loaded with new deep-learning algorithm, enabling the computing power improved by 10 times. As a result, SMD Plus can recognise moving objects and differentiate human and vehicles, so as to effectively avoid false alarms caused by tree branches, insects, shadows, wind or other environmental factors. Meanwhile, users are allowed to select people or vehicles for playback, thus greatly saved target search time. Functions Perimeter ProtectionAutomatically filtering out false alarms caused by animals, rustling leaves, bright lights, etc. Enables system to act secondary recognition for the targets. Improving alarm accuracy. SMD PlusSMD Plus, referred to as Smart Motion Detection Plus, which is an upgrading version of SMD that greatly improves the alarm accuracy by loading deep-learning algorithm. It analyses person and vehicle shapes based on motion detection and send alarms only when person and vehicle intrudes. Smart H.265+Smart Codec, H.265+ can reduce up to 80% bit rate and storage requirements compared with H.264 without having to invest in new cameras. HDCVI/AHD/TVI/CVBS Auto-detectThe XVR can auto recognise the signal of front-camera without any setting. It makes operation more friendly and convenient. Coaxial Audio/Upgrade/AlarmThe integrated design can reduce wiring troubles which makes it much more cost-effective and convenient for installation. Long Distance TransmissionThe HDCVI system supports long distance transmission over coaxial cable and UTP, max. 700m for 4K/4MP, 800m for 1080P and 1200m for 720P. IoT FunctionalityHDCVI IoT can achieve multi-dimensional surveillance by integrating sensors with monitoring video, which not only can generate the report for analysis but also prevent risk in advance. POS FunctionalityThis funcion includes POS ticket information overlay and search which can be widely used in retail programs. Smart Fan DesignThe smart fan can automatically turn on or turn off according to the CPU temperature. This function can effectively reduce the fan noise to provide a better user experience. Spot OutputIt is made for a secondary monitor. This allows the operator to view one special monitor that assigned to selected cameras or video inputs from higher security areas. Smart SearchExtract and classify person and vehicles from massive video data, easy for end users to trace historical informaton and analyse. Person & Vehicle optional for playback to achieve quick target search, saving event retrieval tme.
Access control and video management are key security systems, and ACT365 creates a unified, integrated system, delivering a force that gives users far greater visibility and control of their assets. ACT365 is easy to install and use with an intuitive interface and can provide recurring revenue opportunities for the installer. From an end user point-of-view, system owners can play live video, replay recorded video based on access control events/alarms and is ideal for a customer with multiple sites who want a single interface. The ACT365 VCU (Video Control Unit) is a four-channel video control unit that connects with up to four cameras and streams video footage to the cloud. 1TB storage is sufficient storage for 21 days recording at standard resolution (720p). The VCU communicates to the ACT365 cloud service hosted in Microsoft Azure and is accessible from any modern web browser or Mobile App (iOS/Android). Below are a few choice examples of ACT365’s video power in action: Protecting students on campus: If an incident should arise in student accommodation, ACT365 links events at doors through video footage so campus security can quickly react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Combating break-ins: If there is somebody at a site entrance, persons can be verified, and doors then opened with the click of a button - all from a smartphone. For example, should an incident occur at a door and a business’ cash office is broken into. ACT365 allows you to simply click on the access control event “Door Forced” to locate and review recorded footage of the incident occurring whether you are in, or out of the office. Monitoring your business day-to-day: Another example of ACT365’s firepower can be seen at gyms or other types of membership clubs. For instance, if gym members are passing their access fobs to friends who are not members, with ACT365, you can quickly match up access control events with relevant camera footage and email the clips to those members who are allowing their fobs to be misused. Dealing with deliveries remotely: Ease of use and convenience are key ingredients to the product’s strength and depth in the field. It allows system users manage their systems remotely, including viewing live cameras. For example, dealing with early morning deliveries at a retail store is an ideal example of ACT365 in its prime. From the ACT365 app on their smartphone, the store manager can identify the courier through a live video feed and then remotely open the doors of the loading bay to allow the delivery to be made. The manager can monitor all of this remotely, and once the delivery is finished, they can close the loading bay door, and it will automatically rearm.
The Avigilon H4 Multisensor camera combines self-learning video analytics with exceptional coverage, featuring 3 or 4 individually-configurable sensors that can be positioned to monitor virtually any area. With 9-32 MP total resolution, it delivers broad coverage and high image detail, and uses H.265 compression technology to reduce bandwidth and storage requirements while maintaining clear images. Each camera sensor incorporates Avigilon self-learning video analytics and works with Avigilon Appearance Search™ technology, our award-winning AI video search engine.
Hikvision, the world’s leading supplier of innovative security products and solutions, has introduced new AcuSense network camera series to its EasyIP 4.0 security solutions. Featuring a strobe light and an audio alarm, the new cameras can immediately deter intruders from entering a prohibited site, further enhancing the safety of premises and property. At the core: faster, more accurate intrusion detection Importantly, Hikvision AcuSense network cameras build on the same cutting-edge intrusion detection functionality found within the existing Hikvision EasyIP 4.0 security solutions. When a potential threat is detected by the camera, it uses its intelligent false alarm reduction technology to disregard irrelevant movements, such as rain, leaves and animals. Instead, the camera focuses on human or vehicle movement, dramatically reducing the number of false alarms for faster, more accurate intrusion detection. An enhanced deterrent: strobe lighting and alarmOnce a potential intruder has been accurately detected, the AcuSense network camera triggers the built-in strobe light and audio alarm. This is designed to warn the intruder off before they attempt to breach the perimeter. The volume of the audio alarm and the brightness of the strobe light can be adjusted to suit the environment. Reliable operation, day or nightThe AcuSense network camera range can deliver this powerful intrusion detection and prevention at all times of day or night. Powered by Hikvision DarkFighter technology, all cameras in the range deliver superior surveillance images, even in ultra-low light. Four products to suit different applicationsThe new AcuSense network cameras are available in bullet and turret styles, and in 2MP or 4MP resolution, making a total of four different camera options available. Better service, greater peace of mindFrank Zhang, General Manager of International Product Marketing Department at Hikvision says, “AcuSense technology is already cutting-edge. By adding the strobe light and the alarm, we can now give our customers the chance to prevent incidents from happening in the first place, for even better security. We’re delighted to be able to help our customers protect their property in ever more valuable ways.” Product model detailsThere are four models available:• DS-2CD2346G1-I/SL: 4 MP IR Fixed Turret Network Camera• DS-2CD2326G1-I/SL: 2 MP IR Fixed Turret Network Camera• DS-2CD2T46G1-4I/SL: 4 MP IR Fixed Bullet Network Camera• DS-2CD2T26G1-4I/SL: 2 MP IR Fixed Bullet Network Camera
System OverviewThis PIR model is an indoor/outdoor dual detection camera which uses both video and infrared sensor to achieve accurate motion detection functionality. It also supports active deterrence feature which warns off intruders with white light and siren even before users are aware of the incident. This camera is an ideal choice for applications which require intrusion protect and video verification , such as courtyards, offices, warehouses, stores, etc. Functions 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the HCVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility.* Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 700m transmission for 5MP HD video via coaxial cable, and up to 300m via UTP cable.**Actual results verified by real-scene testing in Dahua's test laboratory. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analog surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional ana-log system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network. Dual DetectionThe detection accuracy is well guaranteed with both motion detection and PIR detection, which can eliminate the number of false alarms you receive. With the advantage of dual detection technology, your HDD will now last longer and not be recorded with false alarms. Gone are the days of alarms caused by heavy wind or rain. Instead, only true threats will instantly trigger an alarm and allow you to protect your loved ones. Active DeterrenceActive deterrence is to warn off intruders actively with white light and siren even before users are aware of the incidence. Once an intursion is detected, the white light will turn on and the siren will buzzer to alert the intruder. The white light can be set to Normally on or Flash, the content of siren is configurable. Smart IRThe camera is designed with array LED IR illumination for best lowlight performance. Smart IR is a technology to ensure brightness uniformity in B/W image under low illumination. Dahua’s unique Smart IR adjusts to the intensity of camera's infrared LEDs to compensate for the distance of an object, and prevents IR LEDs from overexposing images as the object come closer to the camera. Broadcast-quality AudioAudio information is used as supplementary evidence in video surveillance applications. The HDCVI camera supports audio signal transmission over coaxial cable. In addition, it adopts unique audio processing and transmission technology that best restores source audio and eliminates noise, guaranteeing the quality and effectiveness of collected audio information. ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design.The camera is protected against water and dust with IP67, making it suitable for indoor or outdoor environments.With PIR working temperature range of -10 °C to +50 °C (14 °F to +122 °F), the MotionEye is designed for extreme temperature environments.Supporting ±30% input voltage tolerance, this camera suits even the most unstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects of lightning.
System Overview MXVR1004 is the new generation of mobile video recorder, it uses H.265 technology and the advantages are lowering the transmission bandwidth and saing the storage. It can support 1080P high-definition real-time recording, real-time vehicle location tracking and monitoring and the face detection. All the information such as GPS and video can be uploaded via wireless network: 3G/4G/WIFI. It has already passed EN50155/ISO16750 in order to meet the requirements of mobile use.This device can be used in kinds ofsolutions for different applications. Functions Anti-vibration- Using shock-absorbing material and structure, the new designed hard disk box can cope with varying degrees of vibration, keeping the system work normally all the time. Wide range of power supply- As the voltage output of vehicle battery changes during driving, the wide range of power supply can protect the device. 3G/4G/WIFI- Embedded with 3G/4G/WIFI module, the device can register into a public network to connect with VMS, and can send all theinformation(video/audio/alarm/gps) through wireless network. GPS- Embedded GPS module can receive location information and upload to VMS. Even when the device is offline, it can upload theinformation after it's online again and the vehicle can be tracked on the electric map of VMS. Multiple ports- With kinds of ports, like RS232, RS485, I/O, the video recorder can connect with various of accessories, such as card reader, fuelsensor, panic button and so on.system), so that the video, audio, alarm and location information can be uploaded to VMS.
Since 2011, the patented Dallmeier Panomera® multifocal sensor technology has provided comprehensive video protection for vast areas in many football stadiums, perimeters, airports and city areas all over the world. The new Panomera® series, the “Ultraline“, has exceptionally high effective resolution for these situations. Dallmeier presents the first model of the new series, the Panomera® S8 Ultraline, which delivers up to 190 megapixel at 30 fps. The Panomera® concept has revolutionised video technology: with up to eight sensors in a single camera, it is possible to capture enormous distances in unprecedented resolution quality. With fewer cameras and considerably less expense for both infrastructure and management, the total cost of ownership of video solutions are reduced significantly. At the same time, customer specifications regarding pixel density and coverage can be satisfied very precisely. Up to 26,000 sqm. coverage with one camera The first model of the new Ultraline series, the Ultraline S8, has an excellent dynamic range of 130 dB UWDR (effective) for an extreme Panomera® effect. This enables a resolution of 125 px/m up to a distance of 160, 104 or 82 m, enabling individuals to be recognised over the entire distance. Identification of persons (250 px/m) is supported up to a distance of 46 m depending on the model, observation (62 px/m) is possible even up to a distance of 322 m. This corresponds to a huge image space of more than 26,000 sqm. with continuous depth of field. Permanent capture The multifocal sensor system captures and stores all regions of the image space in the highest detail resolution. At the same time, it is not important whether the operators are concentrating on a specific region in live mode (multiple detail zoom) or if regions of interest are displayed in detail based on video content analysis (multiple auto-tracking). The Panomera® recordings always include the entire area of interest and allow every operation to be analysed. “Made in Germany” and GDPR-ready Like all Dallmeier cameras the new Panomera® model is manufactured entirely in Germany, at the Dallmeier factory in Regensburg. This in itself is a major factor in the manufacturer’s data protection and data security strategy, since it is then impossible for unauthorised persons to gain access through “backdoors”, for example. In all, 14 functions such as the setup of private zones, People Masking or the very latest encryption-authentication technology in the processing chain of Dallmeier solutions ensure that the strict requirements of the GDPR relating to data protection and data security are met.
Dahua Technology EVS5024S-R 512 channel embedded video storage features: Dual controller architecture ensures system reliability 64-bit high-performance multi-core processors ensure massive data processing stability Modular, poll-out, Cablese Design keeps system easy-maintainability Supports SAS multiple cascade, external SAS interface bandwidth bi-directional 192Gbps ensures system storage capacity expansibility 24 HDDs in Single device, single system up to 240 HDDs, capacity up to 1440TB Up to 10-1000Mbps Ethernet ports and 4-10000Mbps Ethernet ports Internal backboard bandwidth bi-directional 288Gbps Supports 3.5 inch, 2.5inch SAS/SATA (1T / 2T / 3T / 4T / 6T), Supports mixed capacity HDDs Supports HDD hot-swap, online replacement, online expand Supports standard iSCSI protocol storage and video stream direct storage Under video stream direct storage mode, supports 1024Mbps video storage; supports 128Mbps network playback Under video stream transmit mode, supports 4096Mbps front-end access; 4096Mbps network transmit Under IPSAN working mode, storage bandwidth ≥ 3.6Gbps Supports RAID0 / 1 / 5 / 6 / 10 / 50 / 60 / JBOD, hot standby, ensures data storage safety Supports standard protocol such as ONVIF / GB28181, ensures front-end compatibility from different manufacturers Adopts WEB configuration, easy to setup Software and hardware optimisation aim at monitoring field, supporting other monitoring products form a complete solution Completely standard equipment, compatible with various software platformsAdd to Compare
The Seagate portfolio of video storage drives are designed to improve surveillance system reliability and drive lifespan, reducing security system costs and supporting video analytics. Seagate’s Surveillance HDD helps improve costs and data integrity. Facts and features include: The industry’s first surveillance-optimised hard drive platform with capacities up to 6TB improves video streaming, drive performance and data integrity in surveillance applications. Seventh-generation Seagate® surveillance drive is tuned for high write-cycle workloads typical in video surveillance storage systems. The Surveillance HDD supports higher-resolution cameras and 8+ drives per system, with up to 64 cameras per drive. Reliably performs in multi-drive systems with RAID support from RV sensors Supplement your backups with Seagate Recovery Services for data recovery in the event of data loss or accident. 24×7 operational capabilities while maintaining high MTBF of 1M hours Options for a current-limited start-up of less than 2A supports the use of embedded system power supplies. Low power consumption options support always-on surveillance systems. Never miss a frame with quick time-to-ready. Idle3 spin control features enable power-on in standby mode or drive spin-down to conserve power and improve reliability during archival periods.Add to Compare
Browse CCTV Storage System / HDD
Storage products updated recently
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact.It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it Both are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognised. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organisation. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments.At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference Industry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organisations that might not care about cybersecurity but are prioritising function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
- Razberi Technologies' video surveillance appliances used to upgrade security at the City of Linden
- Dahua delivers customised monitoring solution for Pengsheng Industrial Park in Uzbekistan
- Fermax 2 Wire Duox system installed at an apartment complex in Nottingham
- Hikvision and Create Security provide bespoke video surveillance system to Café en Seine in Dublin