Digital Video Recorders
Existing CCTV and video monitoring systems are already working well to reduce retail shrinkage and are now being extended to help keep stores ‘COVID Safe’, found a new retail sector study of 111 high street retailers based in the UK, US, Sweden and Norway, carried out by Video Security as a Service (VSaaS) provider AVA Security in March 2021. An array of insights into what value physical retailers’ existing video security systems are detailed in the 15 pages Ava Security retai...
Quantum Corporation announces an agreement to acquire the video surveillance portfolio and assets of Pivot3, a pioneer in hyperconverged infrastructure (HCI) and a provider of intelligent software solutions for the security and surveillance markets. The acquisition brings a diverse portfolio of video surveillance appliances, network video recorders (NVRs), and management applications along with a scale-out hyperconverged software platform, which going forward will all be offered under the Quant...
Active Witness Corp., a provider of artificially intelligent, cloud-based visitor management solutions introduces its SIMA multi-factor access control system that stops unauthorised access and redefines how access control is deployed. Conventional facial recognition systems require a person to present his/her face, then search a database and present the closest match and identity. That process is slow and can lead to incorrect identity authorisation and privacy concerns. Quick identity identif...
Dahua Technology, a video-centric smart IoT solution and service provider, recently launches its Cooper-I Series XVR. As the first entry-level XVR to offer AI functions, this series allows customers to avail AI-enabled XVRs without spending a fortune. AI has been a common feature in the monitoring industry, which paved the way for the AI era. With its continuous innovation and development, AI has become part of Dahua's standard configuration, even for entry-level products. With the combination...
Cyberint has launched the next-generation Digital Risk Protection platform, Argos Edge, a fully SaaS-based solution, to provide real-time responses to cyber threats coming from beyond the traditional security perimeters. All-in-one DRP platform Unlike other solutions, Cyberint's holistic and integrated approach combines external Attack Surface Monitoring (ASM), advanced threat intelligence, extensive phishing detection as well as social media and brand abuse monitoring. The differ...
IDnow, a German-based leader in identity verification-as-a-service solutions announced that it has agreed to acquire ARIADNEXT, a French company specialising in remote identity verification and digital identity creation. With IDnow and ARIADNEXT joining forces, the companies can provide one comprehensive identity verification platform, ranging from AI-driven to human-assisted technology and from online to point-of-sale verification options. The combination further increases the services IDnow...
The National Security Inspectorate (NSI) has published the latest revision (Issue 3) of its Code of Practice for the Design, Installation, Commissioning, and Maintenance of Access Control Systems (NCP 109). The updated Code will become mandatory for NSI NACOSS Gold and Systems Silver approved companies from 31st May 2022, allowing time for any necessary operational or administrative changes, however, companies may install systems compliant with Issue 3 with immediate effect. Updates about recognition technology The revision embraces new technologies and methods providing reassurance to buyers choosing system providers compliant with the updated Code that the access control system will reflect their specific needs, usability, and operating requirements. The updated Code covers threat assessment, expected people flows, means of escape in the event of a fire or security incident, and determination of the most suitable type of recognition technology. Requirements mentioned in the code Responding to evolving standards, the revised Code of Practice is aligned with the current Access Control System standard BS EN 60839-11-1 and application guidelines BS EN 60839-11-2. It also draws on the Equality Act 2010, BS 7273-4 for fire protection (activation of release mechanisms for doors), and BS 7671 for electrical installations. The Code contains a requirement to consider customers’ security risks and operational needs for each access point Significantly, the Code contains a requirement to consider customers’ security risks and operational needs to help define the classifications for each access point, ensuring measures are fit for purpose and customer-friendly. Additionally, there are new requirements for IP network installation and some cybersecurity recommendations. Revision provides confidence Richard Jenkins, NSI Chief Executive comments “This latest revision gives further confidence to buyers and specifiers that NSI approved companies are experts in their field, knowledgeable about the latest standards and technologies and hold approval underlining competency in their delivery." “When a company gains independent approval from NSI they are making an ongoing commitment to comply with the latest Standards and Codes of Practice, maintaining a level of expertise which ultimately benefits their customers, as NCP 109 Issue 3 demonstrates.” An NSI Technical Bulletin (0058) has been issued to NSI’s electronic security installers, providing detailed information on the changes to NCP 109.
Keyless, a pioneering privacy-first biometric authentication firm announced that it has joined the DizmeID Foundation, to develop an open ecosystem for decentralised management of digital identities. Control over digital identity DizmeID Foundation operates to combine the benefits of self-sovereign identity with necessary compliance and regulation, to enable wallet holders with ownership and control over their digital identity, data access, and distribution. Keyless will work alongside Algorand, Fabrick, and InfoCert within the foundation to make it easier and more secure for users to share their personal information in exchange for blockchain-based services. Blockchain technology "Many users find the idea of blockchain services intimidating and that has caused the adoption of this revolutionary technology to be painfully slow." By integrating with Dizme, the biometric software will make it more intuitive for users to enroll, and benefit from" "We hope that by integrating with Dizme, that our biometric software will make it more intuitive for users to enroll, and begin benefitting from the services offered on its decentralised identity platform," said Andrea Carmignani, co-founder and chief executive officer at Keyless Technologies. Digital Identity verification Dizme enables organisations to both issues and verifies a user's identity through verifiable digital credentials – a digital version of a real-world identity document such as a driver's license or birth certificate. "The way organisations manage their customer's personal data must change if we want to stop privacy and security breaches from being a daily occurrence," said Daniele Citterio, DizmeID Foundation Chairman. "Currently, our identities are managed by multiple, siloed parties – like private and public organisations. Not only can this leave us exposed to a higher number of threats, but it can also create friction during the identification process," Daniele Citterio continued. Digital credentials With Dizme, organisations can issue and verify verifiable digital credentials to provide services, goods, or resources to users. Once a user has their digital credentials issued to them, they can choose to share their credentials with organisations via their Dizme wallet. Data security "Verifiable digital credentials can help build trust between organisations and users, while also enabling users to control what personal information they share with organisations, and how long for, to ensure their data is not being misused or mishandled" explained Daniele Citterio. Zero-trust authentication platform Keyless zero-trust authentication platform offers strong compliance while ensuring biometric data is never at risk Keyless zero-trust authentication platform offers strong compliance with obligations outlined in the European Union's General Data Protection Regulation – while also ensuring biometric data is never at risk of being compromised or mishandled – making it easier for both companies to target enterprises who need to meet strict compliance obligations. Privacy based biometric solution "At Keyless, we understand that for organisations to fully realize the benefits of emerging technologies, we must make them compliant, private, and secure.” “To protect biometric data from threats, we've combined the security benefits of distributed architecture with privacy-enhancing cryptography. The result is a zero-knowledge biometric solution that ensures biometric data and other personally identifiable information is never at risk," explained Carmignani. DizmeID Foundation Joining the likes of Algorand, Fabrick, and InfoCert, this integration also marks Keyless' participation as a founding member to the DizmeID Foundation – the first decentralised identity network that combines the benefits of decentralised identity as well as the compliance to eIDAS regulations.
photonicSENS, a pioneering supplier of single-lens 3D cameras for next-generation depth perception has collaborated with Qualcomm Technologies, Inc. to accelerate the commercialisation of its industry-leading single lens 3D camera technology. Beneficial features With a complete reference design based on the Qualcomm® Snapdragon™ 888 5G Mobile Platform, smartphone manufacturers can benefit from dramatic enhancements in-depth map resolution for front-facing applications like enhanced face authentication, and rear-facing applications including 3D reconstruction, enhanced bokeh, one-shot macro photography with 3D-reconstruction and printing of small objects and augmented reality (AR). Qualcomm® Platform Solutions Ecosystem Program photonicSENS' single-lens 3D depth sensing solution will be a game-changer for smartphones" PhotonicSENS is part of the Qualcomm® Platform Solutions Ecosystem Program, which enables software and application vendors to pre-integrate and optimise solutions to create a premium user experience and feature differentiation for OEMs. "photonicSENS' single-lens 3D depth sensing solution will be a game-changer for smartphones," said, Ann Whyte, President of photonicSENS. Single-lens apiCAM technology "The 3D depth camera reference designs of this collaboration are based on our single-lens apiCAM technology that with a single device delivers simultaneously an RGB image and depth map to offer smartphone manufacturers the means to differentiate with enhanced photographic features, a 1.4Mpx depth map, the lowest component count, lowest cost and the lowest power dissipation, as well as the best performance in any environment.” “Snapdragon 888 is a clear leader, and we are excited to be working with Qualcomm Technologies to release our cutting-edge 3D sensing solution to market." Availability photonicSENS is presenting the reference design at Mobile World Congress 2021 in Barcelona, Spain from 28th June to 1 July in Hall 3 (3H52MR).
Ava Security, a unified service provider of cybersecurity and video security, has teamed up with Feenics, a provider of forward-thinking Access Control-as-a-Service (ACaaS) solutions, to offer security professionals and integrators a modern, integrated security solution. The Ava Aware Cloud™, intelligent video management system (VMS) is now available as part of the Keep by Feenics™ cloud-based access control platform, providing the simplicity, security, and power needed for proactive physical security. More security professionals are moving to cloud security for a better experience, with better outcomes. Access control events By enabling the 24/7 visual capture of access control events as they happen, Ava Security’s powerful AI analytics gives security professionals what they need to act: usable, precise data, delivered in real-time, whether from a video security stream, reader, or door sensor. This just isn’t possible with either video security or access control alone. After an incident, fast forensic searches allow video security teams to find things faster For instance, if a door is propped open or credential authorisation fails, the Aware Map view pops up, showing the name of the badge holder, the image on the credential, and the exact location in real-time. This is entirely different from simple alert. Plus, after an incident, fast forensic searches allow video security teams to find things faster and reduce the burden of manually reviewing massive amounts of footage. Video security hardware Feenics and Ava hold a shared vision that security technology should be open, secure, simple to deploy and scale, and remotely accessible. Open - Organisations can keep the access control or video security hardware they’ve already invested in. Even existing cameras are accessible through the cloud to provide ubiquitous video coverage–what is needed for real-time proactive security. Plus, security professionals own the choice to mix and match the best technologies to suit their security and risk profile. Secure - Both companies have placed the utmost priority on security given the risks of operating in a connected world. Whether at rest or in transit, Ava’s video surveillance solution is cyber-hardened with always-on end-to-end encryption and factory-installed certificates. It also provides audit trails of both operator and administrator action, which are automatically recorded to address the full spectrum of compliance requirements. Ava is ISO-certified. Keep by Feenics' data is also encrypted in transit and at rest, and the company is both ISO 9001-2015 certified and is an AWS certified-cloud practice. Simple-to-scale - The solution is simple to deploy, manage and scale in the cloud, whether for a single door or multi-site enterprise. Mobile - Security operators can get real-time alerts on any device, on any browser, from anywhere. Additionally, the Keep byFeenics access control system easily integrates with mobile credentials to provide a touchless entry experience. Physical security scenarios Brian Matthews, Director of Sales at Feenics, comments: “Modern, cloud-based security has arrived. Ava Security is the perfect partner for us to help organisations extend the value and power of their access control systems. Together, we’ve made it simpler to proactively secure buildings, doors, assets, and protect people.” George Martinez, Director of Sales Engineering at Ava Security, comments: “Our partnership with Feenics alters the experience for security professionals and equips them to get far more from their security operations. With video security as the ‘eyes’ of the Feenics’ access control system, organisations can easily connect the dots between a security event and the ‘who’ and ‘where’. The result is the ability to respond quickly–even to physical security scenarios that were previously un-addressable with access control or video security alone.”
ASIS International, the association for security management professionals, announces its programming lineup for the hybrid Global Security Exchange (GSX) 2021, with in-person and digital experiences taking place 27-29 September at the Orange County Convention Centre (OCCC) in Orlando, Florida and via the online GSX event platform. Tackling vital issues Encompassing 80+ sessions tackling vital issues in the security profession, the GSX education lineup will be staged across six learning theatres at the in-person event: Offensive Strategies: Preparing for an Attack Defensive Strategies: Surviving the Unexpected Game Plans: What’s Next for Security Highlight Reel: Best Practices Coaching: Building & Motivating Teams Future Plays: Navigate the Changing Landscape Sessions from the Offensive Strategies and Defensive Strategies stages will be streamed live to digital attendees, with recordings of these sessions becoming available within 24 hours of their conclusion. Select sessions from the other stages will become available in the weeks following the in-person event. Live-streamed sessions Digital attendees will be able to chat and ask real-time questions to presenters Digital attendees will be able to chat and ask real-time questions to presenters of the live-streamed sessions. The GSX All-Access experience will kick-off with ten digital sessions made available on-demand following the launch of the digital platform on 15 September. Both digital and in-person All-Access attendees will be able to access online GSX session recordings through 31 December. All-Access Pass registrants can earn up to 21 CPEs toward their recertification whether they attend the in-person or digital experience. “Today’s unpredictable environment requires new rules of engagement,” said Lisa Terry, CPP, GSX 2021 Call for Presentations Selection Committee Chair. “The latest threats, emerging technologies, and advanced adversaries are constantly forcing security professionals to evolve their understanding and skill sets regularly.” Game changer sessions “GSX 2021, designed by security professionals for security professionals, is where global thought leaders present best practices, insights, and guidance on a wide range of security matters. Developing and designing GSX’s acclaimed education lineup has been months in the making, and includes timely subjects that have resulted from the new environment we all find ourselves in.” The GSX session lineup includes expert-led deep dives that can improve the practice of security professionals at any stage of their career, covering topics like access control, asset protection, surveillance, remote workforces, workplace violence, cybersecurity, business continuity, crisis management, resilience, and more. Additional game-changer sessions and keynote speakers will be announced in a few weeks.
IDIS is pleased to announce that its award-winning 12MP IR Super Fisheye camera is now NDAA compliant and available to systems integrators and end-users everywhere. The 12MP IR Super Fisheye ranks as one of the most popular IDIS cameras, due largely to its many innovative and unmatched features, including silky-smooth Smart UX Controls, which enable smooth and intuitive panning, tracking, and zooming with ease and accuracy. These revolutionary controls allow operators to easily follow moving objects or suspects in real-time and dewarp any point of interest in six view modes directly from the camera, VMS, or via IDIS mobile apps on smartphones or tablets. Multi-layered encryptions Essential on-board analytics include active tampering alert, trip-zone alert, and heat mapping tools. The Fisheye can also easily be utilised by IDIS Deep Learning Analytics, allowing users to benefit from a highly accurate object, loitering, and intrusion detection, as well as metadata and appearance searching. Fully cybersecure, this camera is equipped with multi-layered encryptions and proprietary-protocols and gives users the assurance of continuous seamless recording with IDIS Smart Failover. Essential on-board analytics include active tampering alert, trip-zone alert, and heat mapping tools The 12MP Fisheye with its exceptional Wide Dynamic Range (WDR) capability covers a wider area even in varying lighting conditions, maintaining image brightness, exposure, and contrast to provide forensic-level detail right to the periphery. As a result, the IDIS Super Fisheye is a popular choice for schools, retail, healthcare, and logistics centres where it is significantly reducing the number of fixed lens cameras required to cover a particular area, meaning less equipment costs, lower installation fees, and easier maintenance. Video management software “Meeting NDDA compliance and global regulations and standards is a concern for systems integrators and end users worldwide,” says Andrew Myung, President, IDIS America. “We are now shipping an extensive Korean-made range of powerful cameras and recorders that are NDDA compliant, inherently cybersecure, and come with built-in failover. Together with a choice of video management software and our 98% accurate deep-learning powered analytics, we are giving customers the assurance and trust they need, while ensuring an industry-beating low total cost of ownership.” The NDAA compliant 12MP Super Fisheye is setting the benchmark for full situational awareness, which is critically important to rapid incident response and forensic investigation purposes. In addition, the new IDIS NDAA line-up includes a growing choice of network cameras and recorders for applications of any size.
Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. With 4K-compliant cameras projected to make up over 24% of all network cameras shipped by 2023 – there is a fast-growing desire for reliable storage on-board security cameras. The question for businesses is: do they look to break up their existing smart video network, by separating and compartmentalising cameras to handle data requirements, or do they increase its storage capabilities? As some people begin to venture out and return to work following initial COVID-19 measures, we are also seeing demand for thermal imaging technology increase. New technology like this combined with more of these always-on systems being rolled out, means organisations will need to carefully consider their smart video strategy. Newer edge computing will play an important role in capturing, collecting, and analysing data and there are some key trends you can expect to see as a result of this evolution. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyse it and deduce a lot of valuable information in real-time, instead of post-event. Edge computing and smart security As public cloud adoption grew, companies and organisations saw the platform as a centralised location for big data. However, recently there’s been opposition to that trend. Instead we are now seeing data processed at the edge, rather than in the cloud. There is one main reason for this change in preference: latency. Newer edge computing will play an important role in capturing, collecting, and analysing data Latency is an important consideration when trying to carry out real-time pattern recognition. It’s very difficult for cameras to process data – 4K surveillance video recorded 24/7 – if it has to go back to a centralised data centre hundreds of miles away. This data analysis needs to happen quickly in order to be timely and applicable to dynamic situations, such as public safety. By storing relevant data at the edge, AI inferencing can happen much faster. Doing so can lead to safer communities, more effective operations, and smarter infrastructure. UHD and storage AI-enabled applications and capabilities, such as pattern recognition, depend on high-definition resolutions such as 4K – also known as Ultra High Definition (UHD). This detailed data has a major impact on storage – both the capacity and speeds at which it needs to be written, and the network. Compared to HD, 4K video has much higher storage requirements and we even have 8K on the horizon. As we know, 4K video has four times the number of pixels as HD video. In addition, 4K compliant video supports 8, 10, and 12 bits per channel that translate to 24-, 30- or 36-bit colour depth per pixel. A similar pattern holds for HD — more colour using 24 bits or less colour using 10 or 12 bits in colour depth per pixel. Altogether, there is up to a 5.7x increase in bits generated by 4K vs. 1080 pixel video. Larger video files place new demands on data infrastructure for both video production and surveillance. Which means investing in data infrastructure becomes a key consideration when looking into smart security. Always-on connectivity Whether designing solutions that have limited connectivity or ultra-fast 5G capabilities, most smart security solutions need to operate 24/7, regardless of their environment. Yet, on occasion, the underlying hardware and software systems fail. In the event of this, it is important to establish a failover process to ensure continued operation or restore data after a failure, including everything from traffic control to sensors to camera feeds and more. Consider the example of a hospital with dozens or even over a hundred cameras connected to a centralised recorder via IP. If the Ethernet goes down, no video can be captured. Such an event could pose a serious threat to the safety and security of hospital patients and staff. For this reason, microSD cards are used in cameras to enable continuous recording. Software tools – powered by AI – can then “patch” missing data streams with the content captured on the card to ensure the video stream can be viewed chronologically with no content gaps. Thermal imaging Health and safety is the number one priority for all organisations as people return to work and public spaces. Some organisations are deploying thermal imaging to help screen individuals for symptoms as they return. Organisations that operate with warehouses, depots and assembly lines will traditionally have large amounts of cameras located outside of the entrance. With thermal imaging smart video in place, these cameras can now serve a dual purpose as a screening device. The thermal imaging technology is capable of detecting elevated body temperatures, with 10-25 workers being scanned in one shot, from one camera – making it an efficient and accurate process. This way, staff can use the information to help identify people who may need further screening, testing, and/or isolation before returning to work. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices While this may not increase data storage requirements, it can change your retention policies and practices. Smart security today is about utilising AI and edge computing, to deliver an always-on, high-resolution video provision that can help keep people safe 24/7. These trends increase the demands and importance of monitoring, which means requirements of the supporting data infrastructure improve to match that, including the ability to proactively manage the infrastructure to help ensure reliable operation. Companies need to make sure they have considered all the storage and policy challenges as part of their smart security strategy for the future.
The COVID-19 pandemic is the defining global health crisis of our time. In order to be able to fight against it, mask detection and temperature measurement have become daily routines for everyone. In this situation, Merit LILIN, with over 40 years of experience in IP video manufacturers of IP cameras, recording devices, and software, have created a cost-effective COVID-19 solution to ensure end-user health and safety. Temperature measurement Many solutions should provide temperature information, with alert settings that trigger alarms when temperatures are high. The main component of LILIN Temperature Measuring Camera is a dual-lens camera with two sensors, one a visible image lens and the other a thermal array sensor. This design not only provides temperature information and color image information but also high-temperature alert settings when the temperature exceeds. Mask detection With COVID-19 rules and regulations now incorporating person protection equipment such as masks, many solutions are now geared towards mask detection. LILIN has its own mask detection AI, which can be run on an i3 CPU-supported PC. Using the LILIN AI system and Aida NAV server, the system can recognise if the person is wearing a mask or not. If the system identifies a user that is not wearing a mask, an alert goes out with an image of the person. It allows the application to run automatically and enforces the wearing of masks in many situations. A notification is sent to an administrator when an image of a person is captured. Social distancing measures In addition to temperature measurement and mask detection becoming daily epidemic prevention matters, maintaining social distance is extremely significant as well. Through the LILIN Aida detection system, people can calculate the social density and use it with alarm notifications, if an area exceeds the density threshold. Moreover, the LILIN COVID-19 solution has a wide range of applications in different sectors, including schools, public transportation systems, offices, retail and more. By doing so, extensive safety measures can combat COVID-19, providing the public with intelligent epidemic prevention solutions, through innovative AI detection systems.
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focused on the technology side of preventing mass shooting events. Going beyond metal detectors The best way to eliminate mass shootings is to detect weapons before they ever enter, or as they enter, a building. Metal detectors have been effectively dispatched and used to identify weapons on a person entering a building. The major drawbacks of metal detectors are the cost to operate them, several security guards per machine, and the resultant bottlenecks which cause limited throughput at the entrances. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned New technology on the market uses millimeter wave detection to quickly scan someone walking through a portal. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned at the same time as the person. People can walk through the portals side by side to reduce bottlenecks. Additionally, the technology reduces the number of guards needed, reducing overall costs. Taking out the human element The first step in surviving a mass shooting is being situationally aware. Immediately accepting and understanding the sounds as gunshots is paramount. Just a few seconds can mean the difference between life and death during an active shooter situation. Gunshot detection can eliminate the fear factor, which in many cases temporarily paralyses those involved and causes precious seconds to pass before action is taken. By using a trusted, effective gunshot detection solution properly partnered with a monitoring system can eliminate the human factor of indecision and delay. Further, coupled with a VMS camera system, it can visually verify the situation as an emergency, identify the shooter, and provide valuable, accurate information to first responders — all within just a few seconds. The state of gunshot detection technology Gunshot detection technology has been explored and developed by the military since WWI, but commercially it has only been around for a few years. Such detection systems range from wide area coverage to room-to-room coverage. Most are acoustic based (using microphones) to listen for the sound of a gunshot, record the sound, then analyse it with sophisticated software to determine if it is, indeed, a gunshot. Many years have been invested fine-tuning the software to differentiate between a gunshot and other loud noises. Eliminating ambient noise is very difficult during this process. The locations and venues mentioned at the outset of this article inherently have loud, ambient noise. This, in most cases, causes systems to give a false-positive or to even fail to detect the gunshot. In turn, it can send unverified or wrong information to First Responders and Security and cause havoc of unwarranted fear and actions. To help increase the accuracy of the detection of an actual gunshot, many systems have added infrared sensors. Many systems use backroom or cloud servers to run the necessary analysis In addition to the challenge of false positives, many systems use backroom or cloud servers to run the necessary analysis. This not only increases the cost of the system but may increase the notification time of the actual gunshot. Integration of this data to alarm, notification, and camera systems is difficult and costly. And experts say none of these systems are yet 100 percent effective. Enter ultrasonic sensor technology Fortunately, new technology is emerging in the industry. Technology which can eliminate the false-positives and reduce the cost by doing away with the expensive software, servers, cloud servers, and human intervention. This technology uses non-acoustical ultrasonic sensors to detect the frequency of a gunshot concussive wave created by a bullet, leaving the chamber along with the explosion wave force. Because these sensors are not acoustic (microphone), they will not pick up the ambient noise like other systems. In addition, the ultrasonic sensors only detect the gunshot concussive wave within the determined frequency. This also helps eliminate confusion caused by loud noises such as thunder, cars backfiring, large boxes being dropped, etc. An added bonus is ultrasonic sensors are not acoustic, therefore they are never listening or recording, the sensors only operate when there is an actual gunshot; hence, they’re completely non-invasive. The ultrasonic sensors only detect the gunshot concussive wave within the determined frequency Finally, these non-acoustic sensors do much of the work through an onboard processor, no backroom or cloud servers are needed. Integration to systems such as VMS, Access Control, Alarm Panels, etc. requires minimal effort. This allows existing security systems to be integrated with gunshot detection, creating a low-cost, highly effective overall solution. Protecting our children, loved ones, employees, and customers is a monumental challenge for any security professional. Using newly available technology, combined with existing security infrastructure, we have the ability to add on layers of safety to help reduce the tragedy of gun violence and mass shootings. This article was co-written by Brad McMullen, General Manager at 3xLOGIC, and Brad Jarrett, CTO at Active Guardian.
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording. One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time. The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was cancelled to minimise spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Control room video walls provide the most versatile way to visualise and monitor multiple data sources and inputs simultaneously. This video wall case study showcases the power and flexibility of the Userful video wall controller software and video wall processor in a control room / Network Operations Center (NOC) environment. Monitoring operations Lightbound, a leading internet, voice, and data solutions provider in Indianapolis (USA) deployed an 8-display video wall in the Network Operations Center to monitor the company's data center operation, as well as digital signage in their lobby for display general information and other content. Multi-source video wall The video wall at the NOC not only is used to monitor their network and security cameras, but it also doubles as a presentation screen for guests, customers and staff, and as Chuck Reed, VP of Operations at Lightbound, puts it "they use it as a credibility piece... to showcase their capability". Key features: Zero client devices: Every display in the Userful network video wall is connected to the network through a zero client device. Each device is about the size of a deck of cards. With Userful, 1PC can power a video wall up to 100 displays Simple: Configure either a single large video wall or a mix of smaller video walls and standalone displays. Flexible: Content can include up to 8k content, video, HTML5, 3D, live TV, full-screen browser, content from an integrated CMS, or even a desktop. Stunning: Video walls can be arranged in any orientation, allowing for eye-catching, free owing artistic layouts with individual displays rotated to any angle.
The Toronto Transit Commission (TTC) wanted to upgrade the intercom system throughout its subway stations. However, during the planning process, the TTC discovered several obstacles that needed addressing. The agency wanted to upgrade its intercom system with IP devices but did not know how it would ensure a robust and effective local area network to support it. Given the unique characteristics of a subway station, re-cabling would be extremely expensive, disruptive, and time-consuming. Any disruption to subway operations would devastate the city’s transportation infrastructure, as city residents use TTC services to make over 1 million trips per day. Additionally, re-cabling the subway stations would take several months and far exceed the project’s budget. The TTC searched for an innovative solution to overcome its digital transformation barriers. FLEX 24-10G switch The TTC discovered NVT Phybridge and its long reach Power over Ethernet (PoE) innovations and engaged with one of their subject matter experts to learn more. After discussing the project and its challenges, NVT Phybridge recommended the FLEX24-10G switch. The agency was intrigued and organised a no-cost, no-obligation proof-of-concept to test the solution on site. After a few simple setup steps, the FLEX24-10G transformed the existing network into a robust PoE backbone to support the new IP intercom system. FLEX24-10G delivers Gigabit speeds to standard reach and 10/100Mbps symmetrical, full-duplex, and PoE++ (50W) over 4-pair UTP or PoE+ (30W) over 2-pair UTP with up to 2,000ft (610m) reach. With six times the reach of standard switches, TTC was confident that they had found the perfect solution. Digital transformation The TTC used the NVT Phybridge FLEX24-10G switch to deploy over 1,500 NetSpire IP intercom devices The TTC took a proactive approach to find new and better ways to achieve its digital transformation objectives in a financially and socially responsible manner. The agency used its existing infrastructure and the NVT Phybridge FLEX24-10G switch to deploy over 1,500 NetSpire IP intercom devices throughout 75 subway stations. “NVT Phybridge allowed us to re-use our existing cabling,” said Norbert Koot, Senior Engineer, TTC. “Re-cabling all our subway stations would have represented a tremendous scope increase, which would have drastically amplified time and budget requirements to complete the project.” Robust and secure network “The NVT Phybridge FLEX24-10G switch allowed us to create a robust and secure network backbone for our new NetSpire Passenger Intercom System,” said Jeff Thurston, Project Manager, TTC. “The new solution provides greater communication flexibility to help TTC Operations improve the response time to customer’s needs.” The Toronto Transit Commission was extremely impressed and satisfied with the solution, using the FLEX24-10G switch to achieve incredible results. Leverage existing infrastructure to drastically decrease network readiness costs. Simplify the entire digital transformation project while collapsing planning and deployment time. Eliminate business disruption during planning and deployment. Create a robust and secure IP platform that is easy to configure, manage, and troubleshoot. Per the TTCs Green Procurement Policy, the agency chose the FLEX24-10G switch to avoid more than 9 tons of cabling e-waste.
Marriott International Inc. is a hospitality company and the Gaylord Opryland Resort and Convention Centre is a Marriott property in the world. Located in Nashville, Tennessee, Gaylord Opryland offers visitors the chance to experience Music City under a single roof. The resort has a hotel with over 3000 suites and rooms and a smaller adjacent hotel with more than 300. Risk assessment Ryman Hospitality, the organisation that owns Gaylord Brand Hotels, decided to embark on a risk assessment of their properties in 2017. The third-party assessors discovered that CCTV systems were lacking in all of the hotels, including at the Gaylord Opryland Resort. According to Greg Pezzo, Gaylord Opryland Resort and Attractions’ Safety and Security Director, “The system consisted of old operating systems and cameras that didn’t all work. The security team could not get consistent playback from all of their cameras, and they were not able to store data for more than a few weeks at a time.” As a result of the risk assessment, ownership decided to invest in a complete upgrade of all its hotels and chose the Gaylord Opryland as its test case. Their strategy was to use Opryland as the model and then upgrade their other five Gaylord hotels following its success. Installation of multidirectional cameras Working with integrator Herring Technology, Ryman Hospitality designed a solution that features a new video management system (VMS) from Milestone Systems and 400 state-of-the-art cameras from Hanwha Techwin. The Resort purchased a variety of Hanwha cameras, including 145 XND-6010 full HD cameras with video analytics, 182 Q series indoor and outdoor dome cameras with IR, and more than 20 PNM 7000 and 9000 multi-directional cameras. Deciding where to place their cameras was a relatively simple process. Pezzo explains, “We added cameras where we had high volume, where we had experienced problems in the past, and where we didn’t previously have cameras at all.” They also looked at their own data relating to theft and other incidents to help determine camera location. High-quality imaging camera The surveillance system and the cameras are helping to protect the resort against liability from potential lawsuits According to Pezzo, one of the main functions of their upgraded system is protecting the resort against false claims. He states, “From a claims perspective, this surveillance system and, specifically, these cameras are helping to protect us against liability from potential lawsuits.” He explains, “Our older security camera images are grainy or black and white, which means we could not get the level of detail we needed. But, with Hanwha cameras, we are able to capture high-quality images in real-time that show us, for example, how a guest fell: whether there was an obstruction, water on the floor, an indentation, or whether the guest simply tripped.” The ability to protect the organisation against potential lawsuits equates to significant ROI for the Resort. Easy to keep track of movement As a result of the upgrade, security is easily able to track persons of interest clearly as they move throughout the resort. Says Pezzo, “With 3000 rooms and a million square feet of property, the ability to see an individual this clearly as they move through our spaces is incredible. In the past, we would lose people in uncovered sections. They would just disappear. But that doesn’t happen anymore.” For the Gaylord Opryland Resort and Convention Center, the upgrade had an immediate impact. According to Pezzo, “On the first day after installing the new cameras, someone attempted a false claim, but we were easily able to prove that it was not our fault.” For 2021, the Resort plans to invest in more new cameras every few months as the budget becomes available.
The customer is involved in debt collection, mediation, and credit counselling. The client was in the process of expanding their office space, their infrastructure, and adding personnel. They had a conventional video surveillance system in place and were looking to expand its footprint and functionality. An affordable video surveillance solution The primary difficulty with designing a comprehensive video surveillance solution lay in the fact that there are numerous obstacles (cubicles, hidden hallways, nooks, etc…) that make obtaining a thorough overview problematic. The system needed to be one that afforded the users not just an image, but a useable image where specific characteristics of people and events could be identified. The Approach Taken Because of the expansive spaces and detailed images required, the company proposed a High definition Network CCTV video surveillance solution. As they were involved early enough in the process, they were able to coordinate not only with loss prevention but also with IT to ensure that all stakeholders provided feedback and input on how to best configure the solution. Digital solution The greater pixel density of HD cameras allows for the greater digital zooming of recorded video without the distortion Having used the system for approximately 6 months, the client is extremely pleased with how the solution has exceeded their expectations. The greater pixel density of HD cameras allows for the greater digital zooming of recorded video without the distortion that occurs when zooming an image from an analogue camera and we were able to adjust lensing to accommodate the myriad viewing windows desired. Benefits Another benefit for the end-user is that network cameras contain central processors and are eligible for firmware upgrades when improved technology is available for distribution, ensuring that their technology is never out of date. Finally, the company was able to pass along to the customer the lower installation costs that Network Video Surveillance requires. As a result, less of their investment dollar went toward labour costs and expendables such as wire and hardware associated with older, less technologically advanced, analogue systems.
The Cruise Line Company has been a pioneer in the cruise industry for over 50 years. Today, guests travel the world while enjoying unparalleled amenities aboard its award-winning vessels. While at sea, guests can enjoy a unique and memorable dining experience at one of the many specialty restaurants onboard, and watch world-class musical performances, shows, and other entertainment straight from Broadway. Reliance on analogue surveillance equipment The organisation strives to provide the most innovative and accommodating vacation experience for guests while traveling to the most beautiful and exotic locations around the world, including Hawaii, the Caribbean, Bermuda, Europe, Australia, Alaska, and more. However, the Cruise Line was still relying on analogue surveillance equipment throughout many of its cruise ships and was interested in modernising to IP to provide the safest travel experience for guests. Upgrading to an IP-based system The organisation was interested in an IP-based system as it would provide high-resolution viewing and recording capabilities The organisation was interested in an IP-based system as it would provide high-resolution viewing and recording capabilities, improved monitoring, and better application management. The existing analogue cameras were supported by a Coax-based infrastructure that ran throughout the ships. They considered removing the existing Coax and installing Ethernet cabling to support the new IP cameras, but became concerned with the high costs, long deployment times, and environmental impact. Unsatisfied with traditional network design limitations, the organisation looked for an innovative solution. Environmental responsibility The Cruise Line is committed to being a responsible corporate citizen by preserving the precious natural resources that are integral to its success. The organisation strives to minimise waste, reduce CO2 emissions, and engage in impactful environmental partnerships. Every ship has a team responsible for the implementation, training, and oversight of shipboard environmental compliance. Additionally, all crew members receive specialised environmental training and are responsible for ensuring environmental compliance in everything they do. As the organisation planned its modernisation to IP surveillance, environmental responsibility was also top-of-mind. CLEER EoC solution The CLEER switch transforms any Coax-based infrastructure into a robust IP backbone to support any IP camera Given the customer’s digital transformational objectives, the reseller partner, Surveillance International Inc., recommended Modern LAN design principles and the NVT Phybridge CLEER (Ethernet over Coax) solution. The CLEER switch transforms any new or existing Coax-based infrastructure into a robust IP backbone ideal to support any IP camera, with reach capabilities up to 6,000ft (1,830m) – 18-times farther than a standard Ethernet switch. The customer was impressed with the proposed solution and decided to move forward with the digital transformation. A robust and reliable solution After a few simple setup steps, the CLEER24 switch transformed the existing and proven Coax infrastructure into a robust and reliable Power over Ethernet PoE backbone; capable of supporting the new IP cameras in all areas of the ship. Also, the organisation can now connect up to 4 IP cameras using a single Coax cable run using the NVT Phybridge EC4 Adapter. After successfully deploying IP surveillance throughout the first ship, the organisation decided to replicate the success in several of its other liners. Due to Modern LAN design and the NVT Phybridge CLEER24 innovation, the customer was able to simplify the digital transformation and increase the number of cameras on-board its ships, which can carry a combined total of more than 19,000 travellers every voyage. The Ethernet over Coax solution allowed the customer to leverage its existing infrastructure to avoid the risky and complex rip & replace model. Digital transformation objectives The Cruise Line took a proactive approach to find new and better ways to support its digital transformation objectives in a financially and socially responsible manner. NVT Phybridge helped the organisation change the conversation around traditional LAN design; leveraging Modern LAN Principles and PoE innovations to: Deploy over 4,000 IP cameras across eight cruise ships using the existing Coax-based infrastructure Increase the number of IP cameras in all public areas using the EC4 Adapter that supports up to four IP cameras over a single Coax cable run Reduce infrastructure costs by more than $4 million while simplifying and accelerating the project to improve return on investment Ensure the purpose-driven network for surveillance was maintained and enhanced Support IP cameras exactly where they were needed thanks to the CLEER24’s long reach capabilities Prevent over 120 tons of cabling e-waste from entering a landfill Simplify the overall network requirements; creating a robust and cyber secure PoE platform for the IP surveillance equipment Additionally, the Cruise Line can also support other IoT devices using the new IP-enabled local area network, including IP phones, IP speakers, and wireless access points.
Just like other industries around the globe, the patience of parking operations management has been tested as the usage of parking facilities in urban and suburban settings fluctuated widely over the past year due to local health and safety and occupancy restrictions. As the overall industry looks to spring back from COVID-19 levels, it is also simultaneously looking to transition from traditional analog and on-premise managed operations to solutions that digitise parking operations and provide a more contactless experience. Parking management Investments in digital tools such as platforms that employ computer vision technologies are one solution helping to speed up this digitalisation through better management of parking lot occupancy levels, eliminating paper ticketing systems, parking barriers, and other traditional physical elements of commercial parking. One area in particular gaining steam is the deployment of smart cameras, which can perform functions from license plate recognition to traffic flow detection and speed as well as a host of other utilities. These capabilities are particularly useful in surface lots and parking structures in environments such as airports and sporting venues, to large retail or corporate parking areas. Digital parking experience Munich-based Peter Park, a software developer of parking management solutions, has helped many parking operations begin to migrate to more sophisticated technologies by connecting different digital services such as payment apps, e-charging systems, and navigation providers to further increase security and automation. The company operates in more than 50 different sites throughout Germany and logs more than 25,000 transactions every day. Peter Park’s cloud-based offering is based on the use of license plate recognition technology (ANPR), which often requires specialised license plate recognition cameras to identify a specific vehicle, detect the duration of stay, and integrate with online payment systems for a fully digital parking experience. Flexibility in selection and functionality Instead of LPR cameras, the company is using new smart cameras with powerful microprocessors to fuel intelligent onboard analysis via multiple video analytics applications on the camera. Smart security cameras can provide parking operators with increased flexibility using an open IoT platform Based on an open IoT platform from Security & Safety Things, these cameras can be equipped and flexibly re-equipped with a variety of applications, including license plate recognition, analytics to detect the presence of smoke, fire, ice, and spills, or other hazards within the parking environment, and other ready to install applications that fit the most pressing needs of parking management.“We can not only use the best application for the computer vision task, but we can also pick and combine the best camera types of different suppliers for each setup, taking full use of the broad spectrum of different camera features such as zoom control, as an example,” said Maximilian Schlereth, CEO, and co-founder of Peter Park. Reduced maintenance costs The reduction or elimination of parking gates and ticketing machines can have positive impacts on staffing levels within parking management and drastically reduce hardware purchase and maintenance costs of the parking gates and ticketing devices. Smart vehicle routing Additionally, cameras outfitted with parking management apps can help to direct traffic flow by analysing the queue of vehicles waiting to enter the facility and pairing them to available spaces or recognizing when a particular parking area is full. They can also assist in controlling the flow of traffic at peak times to prevent jams and long waits at exits or identify the vehicles of VIPs or season ticket holders at an event venue and route them accordingly to the appropriate parking lot. Parking lot monitoring Smart cameras can also help to manage people, providing valuable security and visitor management functions. Crowd detection analytics can detect the formation of a crowd in the stadium parking lot before it escalates into a post-game brawl, and people counting analytics can detect the number of occupants within each vehicle entering a parking area to better determine anticipated attendance of an event or daily occupancy level of a corporate office location. Analytics can also detect individuals holding weapons and selectively transmit related imagery to help remote operators or on-site security personnel assess and address the situation.
Round table discussion
As a subset of the larger economy, the security industry is bound to feel the effects of an economic downturn. Such was the case in 2020 when the COVID-19 pandemic undermined economic growth and presented a brand new set of challenges to business. The security industry has been able to pivot toward emerging opportunities, but that success has been offset by broader economic challenges. We asked this week’s Expert Panel Roundtable: What impact, positive or negative, has the larger economy had on the security marketplace in 2020?
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analysing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Digital Video Recorders: Manufacturers & Suppliers
- Dahua Technology Digital Video Recorders
- Hikvision Digital Video Recorders
- Vicon Digital Video Recorders
- Hanwha Techwin Digital Video Recorders
- Bosch Digital Video Recorders
- eneo Digital Video Recorders
- MobileView Digital Video Recorders
- LILIN Digital Video Recorders
- Dedicated Micros Digital Video Recorders
- Honeywell Security Digital Video Recorders
- DALI Digital Video Recorders
- Genie CCTV Limited Digital Video Recorders
- LTV Europe Digital Video Recorders
- 360 Vision Digital Video Recorders
- Messoa Digital Video Recorders
- artec Digital Video Recorders
- Everfocus Digital Video Recorders
- Visionhitech Digital Video Recorders
- Vanderbilt Digital Video Recorders
- Ganz Digital Video Recorders