CCTV Storage System / HDD(847)
Hikvision, an IoT solution provider with video as its core competency, has launched a new 4G Solar Panel Kit for Standalone Security Sites. This will revolutionize the protection of remote assets in hard to reach places by proving a security camera that runs on solar power. The kit (DS-2XS6A25G0-I/CH20S40) includes a 4G camera, a solar panel, a battery, and a bracket, and can provide one-stop monitoring in remote environments. This means providers can deliver connected security to scenarios such as agriculture, animal husbandry, and forest fire prevention, as well as temporary monitoring of construction sites. The issue of having no power or network is no longer a problem, with the kit providing power to the camera through the solar panel and connectivity through 4G. It sends data to a communication station and then on to the security monitoring centre, where it can be managed using HikCentral Professional, and the HikConnect app. This means both monitoring and management activities, like viewing footage live, can be done remotely over the 4G network. Its lightweight design makes the kit easy to install, so just one person can install it with a pole mount. The IP67 level of protection makes it hardy against rain, and it also survives well against the strong winds often experienced in remote areas. The kit demonstrates long endurance, detecting power levels and automatically adjusting to power-saving mode when they are low. This means it can work continuously for seven days in cloudy and rainy weather when fully charged. Features include: 40 watt solar panel 20 Ah, built-in rechargeable battery 2 MP @ 30fps DarkFighter® for low-light imaging 8 / 4 / 8 mm lens options 30 m IR distance Built-in 4G (LTE-TDD/LTE-FDD/TD-SCDMA/EVDO) module. Click here for more information.
Launched by Dahua Technology, Dahua WizMind is a full portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, Thermal and software platform which adopts industry-leading deep learning algorithms. Focusing on customer's requirements, WizMind provides precise, reliable and comprehensive AI solutions for verticals. Series Overview The Panoramic Network Camera + PTZ Camera can splice up to a 180° horizontal view to give you a wider view. Working with high-speed PTZ, the camera can display the details. With advanced video analysis algorithm, the camera supports linkage between panorama and details, and situation analysis. Functions Panoramic SplicingWith advanced splicing algorithm, Dahua Panoramic Splicing technology deletes overlapped area and splices multiple images to be a complete panorama. The field of view of the spliced image can be up to 180°, which largely improves surveillance efficiency and user experience. Generally, after splicing, the field of view of four-sensor camera can be 180°. Smart TrackingWith advanced algorithm, Dahua network camera can detect targets, track targets with speed dome, and view details. Crowd DensityWith deep learning algorithm, Dahua Crowd Density technology can detect the crowd density on the image, and display it on heat map; it can detect people quantity and density in selected area and set threshold. When the number or density is larger or smaller than the threshold, it triggers linkage. Vehicle DensityWith deep learning algorithm, Dahua Vehicle Density technology analyses the vehicle situation in the image, such as vehicle number in selected area. You can set threshold, and when the number is larger or smaller than the threshold, it triggers linkage. Perimeter ProtectionWith deep learning algorithm, Dahua Perimeter Protection technology can recognize human and vehicle accurately. In restricted area (such as pedestrian area and vehicle area), the false alarms of intelligent detection based on target type (such as tripwire and intrusion) are largely reduced. ROIDahua Regions Of Interest (ROI) technology allows you to select themonitoring area of interest to improve image effect in the selected area. AR Panorama Dahua AR panorama technology generates wide-field of view through panoramic merging and splicing. The software overlaps the cameras as tags in the image. Click the tag to display the corresponding cameravideo, which makes monitoring visual and convenient, and improves command efficiency. Cyber SecurityDahua network camera is equipped with a series of key security technologies, such as security authentication and authorization, access control, trusted protection, encrypted transmission, and encrypted storage, which improve its security defense and data protection, and prevent malicious programs from invading the device. With UL CAP Certification, TÜV Rheinland Protected Privacy IoT Product Certification, and ETSI EN 303645 Certification, Dahua network camera better meets the demands of cyber security and privacy protection.
Hikvision announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Enhanced AI capabilities Over the last few years, artificial intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performance has improved to enable massive computing power using various algorithms and contributing to multi-intelligence functionality and higher accuracy. The new Dedicated DeepinView Cameras are an example of these advances, incorporating several AI-powered deep learning algorithms in one unit. What’s more, these algorithms can be switched essentially putting 5 or 6 unique cameras in one housing. “Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development. In a world of ever-changing technologies and functionalities, this approach creates great value for end users to try new technologies to ensure security, as well as to implement business intelligence and other applications,” says Frank Zhang, President of the International Product and Solution Center at Hikvision. “The benefits of our new offerings are numerous including reduced costs, improved efficiency, and speedy and effective incident response.” Switchable algorithms The Dedicated DeepinView cameras combine two product categories – the first is vehicle analysis where cameras combine automatic number plate recognition (ANPR) with vehicle attribute recognition. Attributes include the vehicle’s make, color, and direction of movement. Typical uses include installation at checkpoints of city streets and at entrances & exits of buildings or industrial parks. Models in the second category boast six switchable deep learning algorithms in one camera housing, including facial recognition, face counting, hard hat detection, perimeter protection, queue management, and multiple-target-type detection (detecting multiple targets and multiple types of targets at once). Accordingly, users can simply enable an algorithm manually for dedicated use, then later switch the algorithm as needed. Here is one example: hard hat detection. This algorithm can be used on construction sites to ensure safety and compliance. Specially-equipped DeepinView cameras can precisely distinguish a worker on the site wearing a hard hat from those without, and automatically deliver alerts when the hard hat violation is detected. Another example: in a retail setting, a face-counting function can be enabled to precisely count customers entering and leaving the store. Repeat customers and store staff can be automatically excluded in the process, helping store managers count new customers with precision. Flexibility among algorithms enables users to also switch among: Perimeter protection – to monitor outdoor areas needing security and deliver accurate alarms upon intrusions. Facial recognition – to grant authorized access to restricted areas in various organizations, such as school laboratories, archive rooms, and hospital pharmacies. Queue management – to better understand customer wait times, optimize staff levels, and enhance customer experience. HD clarity, day and night Equipped with Hikvision’s DarkFighter and LightFighter technologies, these cameras capture vivid and color images in extremely low-light environments or in scenes with strong backlighting where color and brightness balance is extremely difficult. Smooth Streaming mode further ensures a high-quality live feed. The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions for customers to choose from. More practical and deployable features Furthermore, metadata is supported to allow third-party platforms to receive data from Hikvision cameras for real-time video analysis or recorded into footage archives to enable rapid searching forensic evidence. Finally, these camera models also offer Vibration Detection for outdoor use, which detects and notifies users of vandalism. Find out more To find out more about the new Hikvision Dedicated DeepinView cameras, please visit https://www.hikvision.com/en/products/IP-Products/Network-Cameras/DeepinView-Series/
Agile, scalable, secure, & easy to use, Ava Aware is a powerful video management system equipped with integrated machine learning capabilities accessible in the cloud or on-premises. Aware analyzes all video feeds from all your cameras all the time & in real-time. It identifies objects & events & sends instant notifications & alarms based on rules and unusual activity detection to help your team focus on what really matters.
Hanwha’s PNM-9085RQZ multi-directional camera features motorized varifocal lenses for precise control of focal length, angle of view and zoom for each direction. Each sensor supports remote PTRZ (pan, tilt, rotate, zoom) control for efficient installation and easy adjustment. The 20MP (5MP x 4) PNM-9085RQZ features built-in IR illumination for each sensor. The PNM-9085RQZ allows users to quickly change the camera to 180/270/360 degree configuration as well as custom presets, merging an element of multi-imagers and PTZ presets.
Security requirements change and market trends evolve. One constant remains: the need for intelligent networked surveillance solutions – in every market, for any application. At the heart of Hanwha Techwin’s new product development is the Wisenet 7 System on a Chip (SoC). Developed in-house and built in Korea, we’re continually enabling new features and analytics. Wisenet 7 is our most technology-intensive, innovative and feature-rich SoC…proving the biggest ideas often have the smallest beginnings.
Industrial level ADS LCD panel, suitable for continuous 24/7 operation Ultra-narrow 3.5mm bezel-to bezel design(2.3mm bezel on the left and top sides and 1.2mm bezel on the right and bottom sides) High contrast ratio and high screen resolution greatly enhance the video layering, and present the details of the video High fidelity digital processing, brilliant and vivid video Built-in 3D COMB filter and 3D noise reduction Wide array of connectivity options HDMI, DVI, VGA, DP(daisy chain), RS232, OPS, Audio Built-in picture splicing function Infrared, RS232 dual mode, supporting remote PC control Professional thermal design to extend equipment lifespan Built-in power, low energy consumption, ultra-quiet Fast stack installation, professional project design, supporting arc-shaped mounting Widely used in surveillance center, dispatching platform, safe city, commercial display, etc.
Dahua TiOC integrates 24/7 full-colour monitoring, active deterrence and AI into one smart, innovative solution, greatly saving time and financial costs for distributors and installers. TiOC is suitable for private places that need to maintain orderliness and warn off intruders, such as villas, shops, warehouses, etc. TiOC can accurately identify real targets with accurate alarm, effectively warn them off with active deterrence, and notify the user with real-time alarm. The full-colour image that the camera records provides more useful human/vehicle evidence for future checking and analysis, offering an enhanced protection to residents, shop owners and warehouse managers. TiOC is also ideal for outdoor scenarios such as fire lanes, which need to be always free of obstructions, in most cases vehicles. Give it a try, and you’ll see that the TiOC can effectively maintain emergency lanes clear, working like a responsible guardian that fulfills its duty to enhance public security. The powerful Dahua TiOC Solution offers 24/7 full-colour monitoring, active deterrence and AI with WizSense IP cameras, HDCVI 6.0 cameras & XVRs, and upcoming PTZ cameras, making it ideally applicable to villas, shops, warehouses, fire lanes, and places alike. With its mission of “Enabling a safer society and smarter living”, Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve its partners and customers around the world.
System OverviewExperience 1080P full HD video and the simplicity of using existing cabling infrastructure with HDCVI. The Lite series 1080P HDCVI camera features a compact design and offers a high quality image at a friendly price. It offers various motorized/fixed lens models with a multi-language OSD and HD/SD switchable output. Its structural flexibility and high costperformance makes the camera an ideal choice for SMB solutions. Functions 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the XVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility.* Audio input is available for some models of HDCVI cameras. Easy InstallationHDCVI Quick-to-install eyeball adopts quick-to-install pedestal, which can achieve easier installation than conventional eyeball. Quick-to-install camera reduces time and labor costs. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 800m(1080p)/1200m(720P) transmission via coaxial cable, and up to 300m(1080P)/450m(720P) via UTP cable.**Actual results verified by real-scene testing in Dahua's test laboratory. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analogue surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional analogue system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network. Smart IRThe camera is designed with IR LED illumination for best lowlight performance. Smart IR is a technology to ensure brightness uniformity in B/W image under low illumination. Dahua's unique Smart IR adjusts to the intensity of camera's infrared LEDs to compensate for the distance of an object, and prevents IR LEDs from overexposing images as the object come closer to the camera. Multi-formatsThe camera supports multiple video formats including HDCVI, CVBS and other two common HD analogue formats in the market. The four formatscan be switched over through OSD menu or by PFM820(UTC controller). This feature makes the camera to be compatible with most end users' existing HD/SD DVRs. Multi-language OSDOSD menu provides multiple image adjustments and function settings to meet the requirements of different monitoring scenes. The OSD menu includes configurations such as backlight mode, day/night, white balance, privacy mask and motion detect. The camera supports 11 languages for OSD menu, namely, Chinese, English, French, German, Spanish, Portuguese, Italian, Japanese, Korean, Russian and Polish. ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design. The camera is protected against water and dust with IP67 ranking, making it suitable for indoor or outdoor environments. With working temperature range of -40 °C to +60 °C (-40 °F to +140 °F), the camera is designed for extreme temperature environments. Supporting ±30% input voltage tolerance, this camera suits even the most unstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects oflightning.
Health organisations around the world have created the common awareness that maintaining a safe distance between people is one of the best practices we have to avoid being exposed to COVID-19 and in slowing its spread. As various countries and regions push to reopen businesses and relax stay-at-home orders, social distancing remains an ongoing requirement. More than that, crowd density information is also considered a significant reference in managing the "social distance" of workplaces, businesses and public spaces. Business owners are working hard to keep employees, customers and visitors protected. Dealing effectively with "density" – a new imperative for management and operations – complicates staffing and interpersonal interaction. Limiting the number of people to ensure safety In the current situation, public and private managers and authorities have to do more than ever before to keep people safe, and in many cases efficient calculation of customer traffic will be essential. Hikvision’s Flow Control Solution uses people counting cameras and digital signage, which provides a dynamic on-screen display to show users how many people are entering and leaving a building or an area, and sends real-time alerts in case pre-defined capacity thresholds are exceeded. These people counting camera utilise highly accurate 3D binocular stereo vision and Deep Learning algorithms, making complex counts easy, even in multi-door sites. More important, the Flow Control Solution can be easily and rapidly deployed. It is designed to be simple to use and highly accurate, with options to suit all potential application scenarios. In locations with a single entrance, one people counting camera can be installed at the entrance and connected to digital signage. For multi-entry scenarios, people counting cameras can be installed at each entrance and exit, equipped with I-Series NVRs or HikCentral to calculate numbers of people entering or leaving, so as to accurately provide real-time number data. Multiple entries and exits For example, a supermarket can install a clear and easy-to-understand, dynamic data number display at each entrance to provide real-time updates for people waiting to enter. An alert is generated when the pre-configured maximum is reached, and an audio alarm can be triggered if anyone attempts to enter before the numbers go below that threshold. At present, with expenses more critical than ever, users can use the Flow Control Solution to automatically monitor the situation, empowering businesses and possible reducing the required number of security guards and other resources. Maintaining a safe social distance in public In areas where crowds are unavoidable, such as cash registers in supermarkets and the ticket kiosks at public transportation hubs, managing distances between people queuing (standing in line) is also critical. Authorities in various locations have established specific guidelines and legislation in this area, balancing needs and risks for citizens. Hikvision Dual Lens Cameras (DS-2CD6825G0/C-I(V)(S)) help retail stores and other businesses measure social distancing, and its advanced 3D binocular stereo vision and deep learning algorithm can be configured to trigger alarms according to local regulations and requirements. Users can set the minimum contact distance threshold needed; when the distance becomes less than this pre-set threshold, an instant alarm and popup will appear with audio and video linkage. And there’s more Alongside the Density Control Solution, Hikvision also offers a Mask Detection Solution. This technology ensures that anyone entering a premise is wearing a face mask when they are required to do so. Those without a mask will not be granted entry. The Mask Detection Solution can be delivered in a variety of formats depending on user needs: added to a specialty camera or a Hikvision DeepinMind NVR for users with existing camera systems, integrated into Hikvision’s Temperature Screening Thermal Solution, or as part of a MinMoe door access unit with built-in face detection technology. Entry can be denied if a mask is not worn and/or an out-of-range skin-surface temperature is detected. As businesses begin to emerge from lockdown, they need to find ways to reduce risks of furthering the spread of the virus. This affects whole populations and all their normal activities – from getting coffee on the way to work and boarding public transportation, to shopping and eating out. But there are some technologies that they can turn to – innovations that will facilitate a “new normal” and keep people safe. And Hikvision will be there, every step of the way. For more details, click here.
System OverviewExperience 1080P full HD video and the simplicity of using existing cabling infrastructure with HDCVI. The Lite series 1080P HDCVI camera features a compact design and offers a high quality image at a friendly price. It offers various motorized/fixed lens models with a multi-language OSD and HD/SD switchable output. Its structural flexibility and high costperformance makes the camera an ideal choice for SMB solutions.Functions4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the XVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility.* Audio input is available for some models of HDCVI cameras.Easy InstallationHDCVI Quick-to-install eyeball adopts quick-to-install pedestal, which can achieve easier installation than conventional eyeball. Quick-to-install camera reduces time and labor costs.Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 800m(1080p)/1200m(720P) transmission via coaxial cable, and up to 300m(1080P)/450m(720P) via UTP cable.**Actual results verified by real-scene testing in Dahua's test laboratory.SimplicityHDCVI technology inherits the born feature of simplicity from traditional analogue surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional analogue system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network.Smart IRThe camera is designed with IR LED illumination for best lowlight performance. Smart IR is a technology to ensure brightness uniformity in B/W image under low illumination. Dahua's unique Smart IR adjusts to the intensity of camera's infrared LEDs to compensate for the distance of an object, and prevents IR LEDs from overexposing images as the object come closer to the camera.Multi-formatsThe camera supports multiple video formats including HDCVI, CVBS and other two common HD analog formats in the market. The four formats can be switched over through OSD menu or by PFM820(UTC controller). This feature makes the camera to be compatible with most end users' existing HD/SD DVRs.Multi-language OSDOSD menu provides multiple image adjustments and function settings to meet the requirements of different monitoring scenes. The OSD menu includes configurations such as backlight mode, day/night, white balance, privacy mask and motion detect. The camera supports 11 languages for OSD menu, namely, Chinese, English, French, German, Spanish, Portuguese, Italian, Japanese, Korean, Russian and Polish.ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design. The camera is protected against water and dust with IP67 ranking, making it suitable for indoor or outdoor environments.With working temperature range of -30 °C to +60 °C (-22 °F to +140 °F), the camera is designed for extreme temperature environments. Supporting ±30% input voltage tolerance, this camera suits even the most unstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects of lightning.
Effective video surveillance of an area requires clear, sharp and hi-res images so the operator has complete situational awareness in any weather or light conditions. Cameras continuously film monitored areas and so acquire an abundance of data-rich images. The complexity and volume of information can cause operators to lose attention, making the whole system vulnerable to mistakes and false alarms. It is now possible to reduce these critical issues, which exponentially increase a security system’s risks and operating costs, by using video analysis applied to surveillance cameras. Analysing video footage has become essential to the intelligent management of images and alarms. It ensures that potential intrusions that could threaten people, goods or property are detected and prevented. Videotec is proud to announce that is has released a “robust and smart” video analysis technology, integrated into ULISSE EVO cameras, that offers an end-to-end solution for preventative detection of intrusions in outdoor monitoring applications of critical infrastructures, industrial sites and perimeters. Videotec Analytics is the result of more than 10 years of research and design, carried out by a team of R&D professionals, cooperating together with prestigious international universities and research centres and is designed to be extremely reliable and proactive and be simple to configure and easy to use. Outdoor surveillance specialists The ULISSE EVO camera with Videotec Analysis technology comprises robust algorithms for accurate PTZ detection and precise and smooth auto-tracking, even in the most adverse external environmental conditions. The operator will have complete situational awareness no matter the circumstances. The Advantages of Videotec Analytics ULISSE EVO with Videotec Analytics means: Maximum preventative anti-intrusion efficiency A reduction in human error and therefore Reduced storage space needed: only necessary footage is recorded. Optimal external operation in the most critical and complex atmospheric conditions The GeoMove&Track function allows two ULISSE EVO to communicate with each other through intelligent language, create advanced actions, and perform a tracking based on the geo-coordinates of the target. It gives the immediate benefit of having a complete, turnkey positioning and tracking solution, guaranteed by Videotec. Unbeatable detection performance even at long distances, thanks to the analysis of detail-rich high-definition images. Reduced time and effort needed to monitor, detect and search the recordings for anomalous events. The resulting security system is highly efficient, reliable and convenient. How does Videotec Analytics work? Every time there is an alarm, the auto-tracking automatically activates and event metadata is sent to the VMS via the ONVIF protocol. Simultaneously, the security operators are then alerted and recording starts. The ULISSE EVO keeps the moving target at the centre of the frame and zooms in on the target to make recognition easier. The metadata sent to the VMS system can be used to frame the target with a bounding box for clear identification of the subject or it can be used to activate alarms or begin recording. How to configure Videotec Analytics A simple initial configuration allows ULISSE EVO to detect an object or person present in a sensitive area. Depending on the rules set by the user, an alarm is displayed and auto-tracking activated if an object enters, exits, or appears or stops more than allowed in an area. Thanks to an intuitive management interface, up to ten rules for each pre-set can be configured quickly. Any violation of these rules will activate auto-tracking and other scheduled actions. line crossing (the target crosses a line in one direction or multiple directions) entering/leaving area (the target enters or leaves a specific area) appearing in area (the target appears in a specific area loitering (the target stays in a specific area longer than a defined time) target classification (for people and vehicles) function of detection mask (disables detection activity in a part of the image) Function of video tampering detection (an ONVIF alarm occurs if the camera lens is obscured or covered to block the view) Calibration and target classification with Videotec Analytics The operator can calibrate, via a very intuitive web interface, the scene’s point of view, so it is possible to render the targets in 3D. Targets can be put into three categories: generic object, person, vehicle. Targets will then trigger an alarm based on their size and so false alarms as a result of irrelevant objects appearing in the frame are drastically reduced. Videotec know-how and technology Videotec’s ULISSE EVO range with Video Analytics offers an integrated professional outdoor solution that is more robust and performs better than any other PTZ on the market. Videotec puts its all-in-one products through hundreds of validation tests in order to guarantee optimum robustness and reliability. As well as this, the electronics and networking are chosen from the industrial and automotive sector in order to ensure operation in the most critical environments. Mechanics, electronics, positioning, networking, software, video analysis algorithms and firmware are developed end-to-end by Videotec’s own R&D team. Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected. ULISSE EVO therefore offers Videotec’s guarantee of being a reliable, cyber-safe, future-proof platform that is easily integrable with third-party products.
Contact traceability reporting is the latest feature to be added to ACT365, the cloud-based access control and video management system. The latest feature to the award-winning cloud system helps system-users adhere to new health and safety standards due to COVID-19. For instance, thanks to contact traceability reporting, users of ACT365 can now successfully: Track potentially infected employees and the doors they enter. See people who entered the same door/room. Contact any employee with details from an exported Excel report via ACT365. Monitor doors that require cleaning or disinfecting. ACT365’s contract traceability reporting helps businesses create a safer and cleaner environment for their staff. System users can now remotely monitor their office from anywhere in the world, including tracking international travelers to their site. How it works: Once an employee tests positive for COVID-19, the office manager can trace their movements within the building during a filtered timeframe. This can be achieved by entering the employee’s cardholder ID details into ACT365 and generating a contact traceability report. This report can be downloaded to Excel, and the manager can identify all doors the infected employee entered in the past two weeks. Other employees who also entered those rooms can also be traced and contacted to inform them to self-isolate. Affected doors can also be identified and cleaned.
System OverviewThis PIR model is an indoor/outdoor dual detection camera which uses both video and infrared sensor to achieve accurate motion detection functionality. It also supports active deterrence feature which warns off intruders with siren even before users are aware of the incident. This camera is an ideal choice for applications which require intrusion protect and video verification, such as courtyards, offices, warehouses, stores. Functions 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, such as video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the HCVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility.* Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 700 m transmission for 5MP HD video overcoaxial cable, and up to 300 m over UTP cable.**Actual results verified by real-scene testing in Dahua's test laboratory. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analogue surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional analogue system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network. Active DeterrenceActive deterrence is to warn off intruders actively with siren even before users are aware of the incidence. Once an intrusion is detected, the siren will buzzer to alert the intruder. The content of siren is configurable. Full-colourThe camera adopts F1.2 large aperture lens and 1/2.7" high performance sensor. With higher amount of absorbed light and advanced image processing algorithm, the camera can be able to present 24/7 coloured image that provides colour details to accurately identify people or objects in low light conditons. Warm Supplemental lightsWith two warm supplemental LED lights, the camera is able to provide a colorful and vivid image even in total darkness. It also provides visible by default, the camera is set to smart light mode, in which the camera can automatically adjust the exposure time and light sensitivity simultaneously to avoid overexposure of the objects in the image center. Also, the sensitivity and intensity of the LED lights can be remotely controlled by OSD menu. ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design.The camera is protected against water and dust with IP67, making it suitable for indoor or outdoor environments. With PIR working temperature range of –10 °C to +50 °C (–14 °F to +122 °F), the MotionEye is designed for extreme temperature environments. Supporting ±30% input voltage tolerance, this camera suits even themost unstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects of lightning.
Flow control to support social distancing As the world moves to the new normal and measures are lifted, governments have put in place restrictions to support social distancing and avoid any new spread of COVID-19. Managing and controlling the numbers and access of people in and out of stores and offices, or indeed any building open to the public is crucial in supporting social distancing measures. The importance of real-time data accuracy Measuring occupancy as it happens with immediate updates of the people count is therefore critical as could lead to overcrowding, making social distancing hard to control and causing a risk to safety. The data needs to be gathered in real-time and transmitted instantly to the integrated occupancy software platform in order to give an exact picture on how many people are in a store, room or a specific area of a building. Another aspect to consider is the precision in the count of people going in or out of a store, making sure there are no errors in the count that over time accumulate minimising the reliability of the information, and which could again create unsafe situations or impact negatively on the store sales, if for instance no access was allowed based on incorrect reporting that occupancy threshold had been reached. The OPTEX Akribos VC-1020 is a real-time and multi-directional indoor people counter that can provide more than 97% accuracy. It ignores trollies and baskets and manages groups of individuals by tracking the direction of every individual, even complicated movements such as people turning back or standing still. Now featuring MQTT protocol, the Akribos sensor can be integrated with third party analytics software transmitting instantly the data gathered which can then be used to create key-performance reports, dashboards and visual displays to control occupancy levels. A long-term solution for businesses Many businesses and retailers are using their security staff to manage access and control queue volumes and as such, installers have an opportunity to become the principal point of contact for bringing new solutions regarding occupancy level and social distancing. The solution with OPTEX Akribos solves the issue created by the pandemic, but also solves the ongoing challenge of efficiently and accurately monitoring occupancy levels within a busy working or retail environment. The analytics and people traffic reporting can help retailers manage their staff and product placement better, and in the office to have a more efficient building management based on occupancy level.
The Seagate portfolio of video storage drives are designed to improve surveillance system reliability and drive lifespan, reducing security system costs and supporting video analytics. Seagate’s Surveillance HDD helps improve costs and data integrity. Facts and features include: The industry’s first surveillance-optimised hard drive platform with capacities up to 6TB improves video streaming, drive performance and data integrity in surveillance applications. Seventh-generation Seagate® surveillance drive is tuned for high write-cycle workloads typical in video surveillance storage systems. The Surveillance HDD supports higher-resolution cameras and 8+ drives per system, with up to 64 cameras per drive. Reliably performs in multi-drive systems with RAID support from RV sensors Supplement your backups with Seagate Recovery Services for data recovery in the event of data loss or accident. 24×7 operational capabilities while maintaining high MTBF of 1M hours Options for a current-limited start-up of less than 2A supports the use of embedded system power supplies. Low power consumption options support always-on surveillance systems. Never miss a frame with quick time-to-ready. Idle3 spin control features enable power-on in standby mode or drive spin-down to conserve power and improve reliability during archival periods.Add to Compare
Browse CCTV Storage System / HDD
Storage products updated recently
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye Whilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact.It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it Both are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognised. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organisation. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments.At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference Industry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organisations that might not care about cybersecurity but are prioritising function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
Related white papers
Hybrid hyperconverged systems benefit growing storage and retention needs
Five things to consider for AI with video technology
Making your surveillance cyber secure
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download
- Ava Security highlights ways to protect commercial properties and safeguard people
- Ava Security provides improved security and customer experience with advanced analytics for the retail sector
- HPE enhances data storage solution for the Irish Prison Service along with Scality and CTERA
- IDIS video surveillance solutions strengthens the video infrastructure of Newman University