CCTV surveillance - Expert commentary

Security market offers range of NVR choices for integrators and end users

Network video recorders (NVRs) are at the centre of today’s IP video systems. The video surveillance market includes a wide range of NVR choices for integrators and end users alike. NVR appliances include purpose-built machines that have embedded software systems as well as servers that are sold by video management system (VMS) software vendors and that have been pre-installed and preconfigured with their latest software capabilities. This article will take a look at s...

Casino market conversion from analogue to IP eased by hybrid surveillance systems

IP video recording systems offer high-resimaging, speed & analytics to its end users  Familiarity with analogue systems Familiarity is one factor in the slow conversion of casino customers to IP technologies. Many end users and integrators are comfortable with and have long-term experience with the more simplistic analogue systems. However, as IP systems continue to become easier to install and maintain with more plug-and-play technology, this dynamic shoul...

How to manage abundant video data and maximise operational efficiency

Increases in the number of cameras and storage capacity have created an overabundance of video information that is difficult to manage  Investment in video surveillance technology continues to increase as technology improves and security equipment becomes more affordable. Companies invest in video surveillance primarily to protect people and property, for both deterrence and more crucially for incident response. While there’s no doubt that the systems can provide a...

Wireless devices vulnerable to security network hacking – are closed network security systems the solution?

Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things securi...

Behaviour monitoring and the role of video analytics in understanding casino behaviour

In casino surveillance, there must be an understanding of the behaviour of thieves and cheats. In particular, casinos must understand how the behaviour of a casino adversary differs from that of a legitimate guest. The end result of the understanding is that only threatening or fraudulent behaviour is challenged, leaving other guests free to simply enjoy their visits to the casino. Responding to behaviour anomalies requires understanding that comes from analytics capabilities...

Wavestore’s Better Together partner programme supports VMS security solution installation

Wavestore’s Better Together programme is designed to offer benefits to security installers and integrators An independent video management system (VMS) offers an open platform that can support the “best-in-breed” components of security systems, according to James Smith, director of marketing at Wavestore. “We offer a truly open platform and are truly independent – what we do really well is bring disparate technologies together,” says Smith....

4K security cameras – A new resolution standard for casinos

See larger image The 4K pixel density allows two times the digital zoom of a full HD 1080p camera CCTV cameras with higher resolution have proven their worth in casino settings. Now, 4K security cameras are gaining ground thanks to their ability to achieve full frame rate, which is required by many gaming jurisdictions. 4K is definitely the next resolution standard for casinos in the coming years, says Ron Grinfeld, director, global vertical marketing, DVTEL. DVTEL 4K ca...

Airport perimeter security breach – laughable or potential threat?

If airport perimeter fencing is vulnerable then covert detection methods should be used Lack of airport perimeter security would be laughable, if it weren’t so serious. A recent farcical breach of security in London is drawing renewed attention to airport perimeter protection. I want to focus on airport perimeter security, but we’ll start with critical infrastructure in general: A nun, a housepainter and a gardener break into a nuclear facility. This sounds like t...

Video analytics address violence on city streets

Potential deployments of video analytics, or my own preferred term “intelligent scene analysis,” are being worked on by some of the best minds at university campuses across the United Kingdom. Later this year I will visit Kingston University whose Digital Imaging Research Centre is one of the largest computer vision groups in Europe. Violence prevention through analytical intelligence Here, I talk to Prof David Marshall of Cardiff University, who describes work...

London Metropolitan policing techniques reflect changing demographics

The deputy commissioner spoke about trends and budgeting to MBA students at Cass Business School One of the main challenges for senior officers in London’s Metropolitan Police Service is to develop policing techniques that reflect changing demographics. The main demands on an officer’s time are complex cases, often involving child protection and requiring interaction with other organisations such as health services. Missing persons' cases can now be extremely compl...

CCTV and safe cities: A police viewpoint

Although in many cases CCTV has been an effective investigation tool, its full potential is not being realised It’s all very well installing CCTV cameras, but to be effective users have to know what to do to make images available to the police and courts, according to detective chief inspector Mick Neville of the Metropolitan Police. Although in many cases CCTV has been an effective investigation tool, its full potential is not being realised, says Neville, who is due t...

Cloud increases service opportunities to foster integrator success

Managed and hosted services allow users access from a variety of connected devices It’s not about hardware anymore, although quality components are a must. Now, it’s about how technology performs. For the systems integrator, there’s also an opportunity to provide essential services to keep customers connected. As with many other businesses, the security industry is being “disrupted” and influenced by the cloud. Delivering outsourced security and...