ONVIF, global standardisation initiative for IP-based physical security products held its annual membership meeting in early November this year, with an overview of important activities of 2018 and perspective on the year ahead. Attendees heard presentations on the final release of Profile T in 2018, an advancement which represents how ONVIF keeps pace with technological advancements that affect product development and interoperability between IP-based physical security products. Profile T for...
The global market for licensed mobile radio (LMR) infrastructure and system integration grew 14 percent, reaching $4.6 billion in 2017. Significant growth was noted in Asia, as revenues increased by 26 percent. However, Europe also experienced 8 percent growth in infrastructure and system integration revenue. Cost-optimised digital technology Cost-optimised digital technology accounted for the largest infrastructure and system integration market in 2017, accounting for 50 percent of all infras...
Altronix announced it has added SALTO Systems to its expanding portfolio of Trove Access and Power Integration Solutions, which simplify access system design, configuration and installation, greatly reducing time and labor. The new Trove1SA1 from Altronix seamlessly accommodates SALTO access controllers providing a highly-efficient and scalable access solution. Direct control of access controllers “Our collaboration with SALTO Systems provides integrators with even more versatility,&rdqu...
Antaira Technologies a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNP-1600G, -1802G-SFP, and -2004G-SFP series. As PoE technology has become increasingly popular in many industrial markets including automation manufacturing, security surveillance, power/utility, water wastewater treatment pla...
Altronix, global power and transmission solutions provider for the professional security industry, has enhanced the ACMS8 Dual-Voltage Access Power Controller with bi-colour output LEDs to visually indicate 12VDC or 24VDC at-a-glance. The unit’s switch-selectable versatility adds greater flexibility when combining 12VDC and 24VDC devices further facilitating ease of installation and adding a new level of protection in the same system. ACMS8 dual-voltage access power controller The ACMS8...
Middle Atlantic Products is now stocking and shipping the high-power DC Distribution solution, solving the installation challenges posed by powering a high density of DC-powered components with similar voltages. Part of the industry-award-winning DC Power Distribution family, the new 200W and 300W models provide high current capacity to an industry-leading quantity of outputs — up to 24 devices — maximising the same voltage in a single unit, 5V, 12V, or 24V, or splitting between 12/2...
LifeSafety Power Inc., global manufacturer and creator of a new category of intelligent power solutions, brings critical resiliency, redundancy and networking capabilities with the release of Helix Armour. Designed for seamless failover protection with automatic backup switchover of AC or DC circuitry to reduce the risk of system downtime or outage, Helix Armour sets a bold new standard in reliability and network power management for mission critical physical security and life safety applications. Helix Armour Helix Armour minimises the risk of failures that could compromise system integrity by providing both AC and DC redundancy Helix Armour minimises the risk of failures that could compromise system integrity by providing both AC and DC redundancy in the event of problems with the power supply or incoming AC power. Featuring network management, it provides predictive network reporting that optimises and maintains the highest levels of performance and connectivity to critical applications and devices. Standout features of Helix Armour include: Monitors separate AC branch circuits reporting trouble with a primary branch immediately and instantly transferring power to backup for uninterrupted system operations in critical access control or security systems, as well as banking, gaming, pharmaceutical, Sensitive Compartmented Information Facility (SCIF) and data room servers. Redundant and mirrored power supplies also monitor and report DC integrity. In the event of a power system failure, the solution transfers to the secondary power supply without dropouts or voltage spikes. With LifeSafety Power’s patented NetLink networking technology at its core, Helix Armour detects and reports system wide anomalies or power trouble across the enterprise so critical infrastructures stay properly secured. With multiple Underwriters Laboratories listings and certifications, Helix architecture is especially designed for mission critical applications in government, finance, medical and high-tech industry vertical markets. Network power management Helix Armour brings the highest levels of redundancy, reliability and networking management to power services" “Helix Armour brings the highest levels of redundancy, reliability and networking management to power services across even the most highly regulated and mission critical enterprises,” said Guang Liu, Co-Founder and Chief Technology Officer of LifeSafety Power. He adds, “The ability to provide both AC and DC redundancy, in a proactive, real-time manner and with zero latency and automatic switchover in the event of a power anomaly establishes Helix Armour as a true total assurance solution for end-users in the most challenging markets and environments.” Helix Armour is part of LifeSafety Power’s expanding patented, modularly designed technologies made in the USA and is available in wall or rack mount configurations.
Instead of keeping track of a key fob or card, some people may prefer using their smartphones to get into their businesses or secure work areas. Digital Monitoring Products (DMP) can now give those customers the convenience they prefer. Farpointe Data’s new CSR-35 Conekt Bluetooth Reader and CMC-2 Smartphone Mobile Access Credentials are the newest members of DMP’s expanded line of high-security access control products. Together, they allow iPhone or Android smartphones to function as a contactless electronic access control credential. Higher security encryption technology The new readers can be installed on a metal door, window frame, or flat surface at any entry point, and are also compatible with DMP’s DE2 smartcard credential. Like the DE2, the new CMC-2 mobile credential is based on MIFARE DESFire EV1 technology, offering an even higher security encryption technology standard than traditional credentials. Like any other app they’re using, authorised users would just need to download and install the required app, called Conekt Wallet, which is available on the Apple App or Google Play Stores. Once the app is installed and the virtual credentials are activated, users can present their phones to the reader — this establishes a secure Bluetooth connection and an encrypted transmission to the user’s smartphone.
Altronix, global provider of power and transmission solutions for the professional security industry, is showcasing the new eBridge1600F 16-port EoC receiver with integral PoE switch here at GSX 2018 (booth #1950). The new and innovative eBridge1600F power and transmission solution further bridges the infrastructure gap by integrating coax, Ethernet and fiber along with PoE, thereby eliminating the cost and labor associated with installing new network cabling. eBridge1600F 16-Port EoC receiver “Altronix continues to design and deliver new power and transmission solutions that merge infrastructure with emerging technologies to accommodate greater capacity and speed for today’s advanced IP installations,” said JR Andrews, National Sales Executive, Altronix Corporation. “The new eBridge1600F allows coax users to cost-efficiently upgrade analog systems to IP with the ability to take advantage of new or existing fiber infrastructure to deploy IP devices at greater distances.” Coax to IP transmission upgradation Altronix eBridge1600F is an all-in-one, head-end solution for upgrading coax to IP that combines a PoE+ switch and EoC Receiver into a single integrated unit. It features 16 Ethernet ports rated at 100Mbps (full duplex up to 300m without repeaters) with 30W full power per port (500W total power), one 1Gb SFP (fiber port), and two 1Gb Ethernet uplinks. Additional features include a built-in battery charger, and embedded LINQ Technology to monitor, control and report power/diagnostics from anywhere over the network connection. As with all Altronix products, eBridge1600F is manufactured in the U.S.A., and is backed by a lifetime warranty.
Altronix, a recognised provider of power and transmission solutions for the professional security industry, has enhanced its industry leading line of NetWay Midspans with the introduction of two high-powered additions here at GSX 2018 (booth #1950). The NetWay8GP 8-port Midspan provides up to 60W power per port to power PoE/PoE+/Hi-PoE devices (480W total), and the NetWay16G 16-port Midspan up to 30W power per port for PoE/PoE+ devices (480W total). NetWay8GP 8-port and 16-port Midspan “As IP devices continue to offer more features requiring higher power, our new NetWay Midspans provide the power and intelligence that today’s networked systems demand,” said JR Andrews, National Sales Executive, Altronix Corporation. The NetWay8G and NetWay16G both feature: a 1U rack enclosure; 10/100/1000 Mbps data rates at distances up to 100m; an integral battery charger for applications requiring backup; and embedded Altronix LINQ Technology to monitor, control and report power and diagnostics from anywhere. As with all Altronix products, all NetWay series products are manufactured in the U.S.A., and backed by a lifetime warranty.
Altronix, a globally recognised power and transmission solutions provider for the professional security industry, introduces the latest additions to its popular series of Trove Access and Power Integration Solutions at GSX 2018 (booth #1950). Trove1M1WP outdoor enclosure The new Trove1M1WP outdoor enclosure with backplane allows for easy integration with Altronix power and Mercury/Lenel access controllers. The new Trove Rackmount Series accommodates access controllers from leading manufacturers expanding versatility beyond wall-mount configurations. These new additions simplify board layout and wire management, while reducing installation time and labor costs. “Trove continues to win projects and grow in popularity with integrators because it delivers a highly pragmatic access and power integration solution that’s easy, fast and extremely cost efficient,” said Ronnie Pennington, National Sales Engineer, Altronix Corporation. Trove rack series with multiple access controllers Trove1M1WP is a NEMA 4/4X IP66 Rated outdoor enclosure with backplane designed for use with Mercury/Lenel access controllers and accessories, with or without Altronix power and sub-assemblies, while accommodating up to two 12VDC/7AH batteries. The durable enclosure is manufactured with stainless steel continuous hinge and lockable latches. Trove1M1WP can be wall or pole mounted using the optional PMK2 Pole Mount Kit. This outdoor series of Trove will expand to other leading brands of access control in the near future. The new Trove rack series accommodates a host of access controllers including Mercury/Lenel, HID/VertX, Software House and more. Additionally, an Altronix only backplane allows for the versatility to design a custom rack mount access control power supply. Integrators now have the option to incorporate power in the same rack mount unit with the access controllers or consolidate power for their system in a single enclosure, saving valuable rack space. All rack mount units include a tamper switch, cam lock and Z bracket for ease of installation and wiring.
Altronix, the provider of power and transmission solutions for the professional security industry, is showcasing the new eBridge1600F 16-port EoC receiver with integral PoE switch here at GSX 2018 (booth #1950). The new and innovative eBridge1600F power and transmission solution further bridges the infrastructure gap by integrating coax, Ethernet and fibre along with PoE eliminating the cost and labour associated with installing new network cabling. “Altronix continues to design and deliver new power and transmission solutions that merge infrastructure with emerging technologies to accommodate greater capacity and speed for today’s advanced IP installations,” said JR Andrews, National Sales Executive, Altronix Corporation. “The new eBridge1600F allows coax users to cost-efficiently upgrade analogue systems to IP with the ability to take advantage of new or existing fibre infrastructure to deploy IP devices at greater distances.” Embedded LINQ technology Altronix eBridge1600F is an all-in-one, head-end solution for upgrading coax to IP that combines a PoE+ switch and EoC Receiver into a single integrated unit. It features 16 Ethernet ports rated at 100Mbps (full duplex up to 300m without repeaters) with 30W full power per port (500W total power), one 1Gb SFP (fibre port), and two 1Gb Ethernet uplinks. Additional features include a built-in battery charger, and embedded LINQ Technology to monitor, control and report power/diagnostics from anywhere over the network connection. As with all Altronix products, eBridge1600F is manufactured in the U.S.A., and is backed by a lifetime warranty.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types of access control authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organisations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasise, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organisations want to use smart phones in their upcoming access control implementations. Smart phone access control is secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices.All that should be needed to activate newer systems is simply the phone number of the smart phone Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone. Bluetooth and NFC the safer options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defence of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging systems could cause problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organisations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organisations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced security and automation features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimisation of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret of the consumer radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilising frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-on-chip solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilisation of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional smart home services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilising existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimisation of maintenance and installation costs.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused responses to events Audio analytics processed in the camera, has been a niche and specialised area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Having a SoC allows a manufacturer to reserve space for specialised features, and for audio analytics, a database of reference sounds is needed for comparison Microphones and algorithms Many IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. In-built audio-video analytics Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialised features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring a camera for audio analytics Audio detectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup Noise reductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyses the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio source classificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly Messages and eventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analysing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analysing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analysing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video transmission and privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs. For example, while some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximise accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR for physical security professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organisation, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organisation.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specialises in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting video surveillance systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are increasing the capabilities for Mercury OEMs in areas such as two-way communication and encryption. Enhancements include use of the OSDP (Open Supervised Device Protocol) v2 communication standard instead of the older (and less flexible, less secure) Wiegand standard. Other advantages are relay count activations, a crypto memory chip and default encryption, a critical feature ensuring greater cybersecurity. Integration of hardware with physical security Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system. Mercury also provides hardware integration at the controller level with elevator manufacturers such as Otis, Kone and Thyssenkrupp, including “destination dispatch,” which groups passengers going to the same floors into the same elevators, thus reducing waiting and travel times. Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system Integration of Mercury controllers with LifeSafety Power’s IP-based intelligent power supplies enables system health and diagnostic data to be shared for preventive maintenance. Mercury also offers several “bridge” products to enable its OEMs to transition installed proprietary systems from outdated Casi-Rusco (GE), Software House I (Tyco) and Infographics (GE) technologies to an open platform using Mercury hardware. Business as usual Other recent news for Mercury is the company’s acquisition by HID Global last fall. Mercury Security President Matt Barnette says the acquisition will not impact how Mercury goes to market. “It’s business as usual,” he says. “It’s 130 days into the acquisition, so it’s still early on, but we are continuing to do what we do.” Steve Carney, HID Global’s vice president of product marketing for physical access control, provided an update from the HID Global perspective to MercTech4 attendees. He reiterated that there would be no change in Mercury’s OEM go-to-market strategy. HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud He emphasised that Mercury’s team and talent remain core to the brand, and HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud. Open architecture companies throughout the access control industry – Mercury’s OEM partners – are incorporating the new boards into their products, each putting their “spin” on those capabilities and expanding the functionality of their systems. At MercTech4, seven of those OEMs hosted small groups of consultants in focused meetings to highlight what’s new with their products. Lenel honoured as 'Platinum Premier' partner Lenel, Rochester, N.Y., has been a Mercury's OEM partner since 1995. Lenel is Mercury’s first-ever "Platinum Premier" partner. In recent years, Lenel’s OnGuard system has evolved into a fully browser-based system providing both alarm and cardholder management through web browsers, and access to the platform on a computer, laptop or tablet. OnGuard WATCH (Web Access Trending and Comprehensive Health) provides system monitoring tools and health checks, such as tracking CPU usage and logging error files. Lenel has introduced its own BlueDiamond mobile credentialing system based on Bluetooth Low Energy and deploying mature technology previously used by sister UTC companies for real estate locks and in the hospitality market. Feenics, an Ottawa, Ontario, cloud-based access control company, was also among the Mercury OEMs participating in MercTech4. The Keep by Feenics platform is scalable from a single door to a global enterprise environment. A RESTful API provides easy connection of third-party applications. Feenics emphasises cybersecurity in the cloud, using Amazon Web Services, Transport Layer Security (TLS) encryption, and Veracode penetration testing. They use MongoDB open source database replica sets instead of Microsoft SQL. Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments Integration and encryption RS2 Technologies, Munster, Indiana, is another Mercury OEM highlighted at MercTech4. Their top vertical markets are K-12 schools, utilities, healthcare and government. RS2’s features include a PSIA-compliant interface, compatibility with BACnet and the Pinwheel DME (Data Management Engine) for bi-directional database integration.RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer. Product enhancement is a focus of RS2’s engineering. Open Options, Addison, Texas, is a Mercury Platinum Elite partner whose customer base spans every vertical, and whose feature set reflects customer feedback. Open Options offers Mercury hardware mounted inside a sleek plastic enclosure, among other form factors. The company emphasises an open business culture and dedication to customer service. Customer support is a direct phone line to speak with a live person every time to get any issue resolved. Open Options’ DNA Fusion Version 7 platform includes new features such as an updated user experience. DNA Fusion interfaces seamlessly with security technologies — including video, biometrics, wireless locks, and more. Last year, Open Options marked 20 years of partnership with Mercury Security. Engineering for the masses Avigilon, Vancouver, B.C., is embracing new Mercury products in its completely browser-based Linux platform that can scale from entry-level to enterprise systems. The ACM (Access Control Manager) software is engineered for IT professionals and is updated every 60 days. For Avigilon, access control is a component of a broader approach that uses analytics and self-learning to manage massive amounts of data and provide the information an operator needs. The Linux-based system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance The system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance. Genetec, Montreal, Canada, emphasises the value of its “unified” approach that combines video, access control and automatic license plate recognitions into a single platform – designed from the ground up – that incorporates communications, intrusion detection and analytics. Cybersecurity failures prominent in the news often occur because of negligence – the customer had not implemented a software patch, for example. Genetec helps to manage such concerns. When cameras are deployed in the Genetec platform, the system provides an alert if a new camera firmware version is needed. The Genetec Update Service (GUS) notifies customers of any needed software updates. Prominence of cybersecurity Honeywell’s Win-Pak access control software is integrated with the Pro-Watch security management suite. Cybersecurity is a corporate priority for Honeywell, whose products follow the SDLC (systems development life cycle) process with security requirements based on the ANSI/ISA 62443-3-3 standard. Microsoft's Threat Modelling tool identifies entry and exit points of systems that an attacker could exploit, providing the development team an attacker's viewpoint. The secure product development process includes static code analysis, secure code review, code signing, binary scanning and component inventory. Products are thoroughly tested by the Product Security Assurance Team and at times by an Advance Independent Testing Team. If vulnerabilities are identified after release, they are handled by the Product Security Incident Response Team. Cybersecurity issues dominated a consultant roundtable event on the second day of MercTech4. There was plenty of spirited discussion and some valuable insights among the 40 or so participating consultants. More to come on that in another article in the next couple of weeks.
Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly, according to the company. Known for its COLDSTORE surveillance storage system and other video products, Veracity is expanding its scope with the acquisition of I-Comply Ltd. (icomply), a provider of command-and-control software whose UK customer base includes universities, hospitals, cities and power and water utilities. Veracity and icomply have previously worked together on several projects, so the technologies are already integrated, and Veracity plans to leverage the acquisition to introduce a new command-and-control product line to the US market, likely to be announced around ISC West. Icomply command-and-control software Icomply’s product is a command-and-control software system (sometimes called a PSIM, or physical security information management system). Veracity plans to sell software based on icomply’s technology under the Veracity brand in the US market, but will keep the separate brands in the United Kingdom, where icomply is better known. Icomply has existing integrations with many third-party systems from international brands, including major access control, video management, fire and alarm systems such as Bosch, Honeywell, Axis and Hanwha Techwin. Entering the US market, Veracity expects to add additional sales support and maintenance personnel, and a development team will expand integrations to third party systems that are more common to the US market. In addition to command-and-control functions, the software offers a suite of modules to provide functions such as key management, lone worker protection, mapping, and guard tour management. The configuration of the system to be introduced into the US market is still to be determined. Potential growth Icomply has about 20 employees, which will be added to Veracity’s 50 employees. The icomply team will remain, and will move into larger premises near Leeds (UK). At current sales levels, icomply will make up about 10 percent of Veracity’s revenue, but hopes are high for rapid growth. Alastair McLeod, group CEO of Veracity, says the small company has plenty of unrealised potential. He projects sales could double this year, and then double again in 2018 (admittedly from a small base) – and that doesn’t even count any potential sales in the United States. “We know the engineers, and the product has developed considerably until it is now mature. The architecture is quite elegant, which makes it easy to add on modules.” “We have worked with this company for some years, know them, have done projects with them,” says McLeod. “We know the engineers, and the product has developed considerably until it is now mature. The architecture is quite elegant, which makes it easy to add on modules.” The acquisition will provide icomply the needed cashflow and capitalisation to jump-start sales, and to deliver needed technical support and rapid response to customer requests, he adds. Stability and longevity are important elements in the command-and-control systems market, notes McLeod: The systems are seen as a long-term investment that involves integrating various systems over a five- to 10-year period. “The backing of Veracity will make more customers comfortable moving to icomply,” McLeod notes. The icomply acquisition also includes a subsidiary in India that will boost Veracity’s presence in that market. Technical resources in India will help Veracity grow in the lucrative Middle East market, just a short plane flight away, where the need for long video retention times are a great fit for Veracity’s existing video storage products. Moving away from commoditisation McLeod sees the acquisition as a reflection of the need for companies in the security industry to move away from commoditised products. It will expand Veracity’s presence from one of supplying components to the system to supplying complete integrated solutions. “With this acquisition, we are moving up-market in terms of being able to supply whole systems,” he says. “And it’s a category that cannot be easily commoditised. There is an element of customisation and services. We want to become a part of the market that has more stability and resistance to price cutting.” “We want to control our own destiny,” McLeod says. “Our customers are asking us for a complete system – for everything to come from Veracity. They know the vagaries of buying bits from several companies – what if something doesn’t work? We can now approach customers that want an integrated solution.” The all-cash acquisition was closed in December 2016.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission critical communication over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritised over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced communication solutions in Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritised delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones in MCC over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value and Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service centre. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimises data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits to financial sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key to data security is operational policies for: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How to protect your surveillance online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signalling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signalling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration and Internet of Things in VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organisations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-to-use user interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
Specified to provide a comprehensive security, health & safety and production management tool, SAIC General Motors Wuling (SGMW), is now operating a Hikvision-based HD surveillance system at one of the world’s newest vehicle manufacturing plants. Established in 2002 by a joint venture and investment between SAIC Motor Corporation Ltd, General Motors and Guangxi Motor Corporation, today, SGMW is an annual producer of 1 million commercial vehicles and passenger cars, including MPVs. To meet its ambitious automotive production plans, SGMW recently opened a third manufacturing plant located in Bekasi, Indonesia. Costing 700 million USD, the new factory is built on a massive 60-hectare site and is expected to contribute to the creation of some 10,000 local jobs, producing its first vehicles under the Wuling brand. Along with the adoption of General Motors’ Global Manufacturing System incorporating an advanced production layout, SGMW’s manufacturing philosophy leverages cutting-edge best practice ideas and management systems that capitalise on its available resources - building competitive value within its business operation. To provide the level of intelligent camera functionality and surveillance management required to meet the demands of the state-of-the-art SGMW factory project, the automotive manufacturer enlisted the help of Hikvision distributor, Prima Inovasi Teknologi. Across the entire site, the Full HD Smart camera network provides effective scene coverage and VCA alarm activation Smart Full HD video surveillance Installed by Autojaya, the 172 Hikvision Full HD smart video surveillance camera-based system was designed from the outset to deliver the best quality of imaging and intelligent functionality required by SGMW. Integrating Full HD capture, recording, decoding and display, the system utilises IP transmission over a local fibre Video Private Network (VPN). Using a mix of Hikvision DS-2DF8223I-AEL 2MP WDR Darkfighter IR PTZ cameras with Smart Tracking & Detection, DS-2CD6026FWD/E-L ultra-low light Smart Darkfighters, DS-2CD4A26FWD-IZ 2MP Smart Low Light cameras and DS-2CD6986F-H 8MP Multi-Imager Panoramic Dome cameras with 180° Horizontal View, the HD camera system supplies ultra-detailed imaging of every key internal and external factory location. Across the entire site, the Full HD Smart camera network provides effective scene coverage and VCA alarm activation, providing HD imaging and automated situation alarm handling for the factory’s vehicle production areas, components warehouse, restaurants, data centre, offices, perimeter fence line, and exit & entry points, via a bespoke ANPR subsystem. PoE devices Along with the HD surveillance cameras, the system uses Hikvision DS-3E1318P-E Web-managed PoE Switches, DS-6916UDI HD Decoders and DS-96128NI-I24 128-channel Super 4K NVRs with up to 12-megapixel resolution recording, multi-format video encoding and HDD hot swappable storage to deliver ‘live’ and ‘recorded’ camera images to the factory’s Control Centre. To maximise the high-level of image detail that the HD cameras deliver, the system’s camera images are displayed on two massive video walls, consisting of multiple Hikvision DS-D2055NL-B LCD HD ultra-slim 55” display monitors. In the event of an incident or anything unusual taking place, the operators can react quickly, and select and review video information for analysis iVMS-5200 enterprise software At the Control Centre, SGMW operatives view the entire factory site on a 3D electronic E-Map render, with intuitive Smart control provided by Hikvision’s iVMS-5200 Enterprise Software. Using the 3D site map, operators can easily locate and select any system camera, and control specific camera live or recorded video, along with video preview of triggered alarms, with their precise locations displayed via graphical icons on the factory E-Map. Using the Enterprise Class Hikvision HD camera-based system, operators can monitor in real-time, every stage of the vehicle production line process in finite detail. In the event of an incident or anything unusual taking place, the operators can react quickly, and select and review video information for analysis and reaction to the case, to keep vehicle production safe, whilst maintaining production and management efficiency. Archived video data monitoring The system’s archived video data can be accessed for use by many factory departments, to provide visual information to remedy specific problems and support improved manufacturing and management efficiency, as well as the factory’s health & safety environment. Vehicular traffic is managed by a separate Hikvision ANPR subsystem with automated Whitelist and Blacklist alarm management, to ensure fast and smooth traffic flow in and out of the factory. Using Hikvision Smart camera VCA alarm functionality, the system has been configured to provide the highest level of protection and safety" ANPR subsystem “The Hikvision surveillance system supports SGMW’s site-wide management needs across many disciplines,” comments Bella, lead engineer of SGMW. “Using the cameras for multi-functional applications enriches the efficiency, security and implementation of best practice management across the whole factory, paying back its initial return on investment and operational value many times.” “The system’s end-to-end unified hardware and software delivers advanced situation awareness of the factory’s personnel, vehicle production line, paint shop, data centre, offices and finished vehicles storage,” explains Mr. Arijanto, Director of Autojaya. “Using Hikvision Smart camera VCA alarm functionality, the system has been configured to provide the highest level of protection and safety for factory personnel, assets and site facilities. Any unauthorised access attempt to the site’s perimeter or internal restricted areas are all covered by the system, offering advanced protection whilst reducing the number of security guards needed.”
Wavestore, the British manufacturer of open platform video management solutions is helping to detect the presence of hooligans at three of the largest football stadiums in Montevideo, Uruguay. Working in conjunction with Systems Integrator partner DDBA, Wavestore’s VMS has been deployed at the Centenario, Penarol and Nacional stadiums to enable the police and security personnel to identify known troublemakers and prevent them from gaining entry to any of the grounds. Facial recognition technology The project, which has seen Wavestore installed within the stadiums’ control rooms as well as in mobile police units, was won following an extensive evaluation process in which Wavestore and technology partner, Herta, a provider of state-of-the-art facial recognition software, proved to be highly effective compared to those offered by other manufacturers. Manufacturers competing for the project were allocated a specific period of time to set up their integrated solutions to demonstrate the ability to detect and identify 40 people who had been entered onto a database and who were randomly integrated with an estimated 50,000 football fans approaching the stadium entrances to attend a match. When the results of the tests were analysed, it was found that Wavestore and Herta had been able to detect 39 of the 40 targets, even though many were wearing hats, scarves and dark glasses. The one person who was not detected had completely covered their face. The contract to install the video surveillance systems comprising of a fully integrated Wavestore/Herta solution and multiple HD cameras, was awarded to DDBA Wavestore-Herta video surveillance system The contract to install the video surveillance systems comprising of a fully integrated Wavestore/Herta solution and multiple HD cameras, was awarded to DDBA, a leading security and IT infrastructure systems integrator. “As is the case in many countries in the world, football stadiums in Uruguay have regretfully experienced anti-social behaviour on match days,” said German Ruiz, a Director of Montevideo-based DDBA. “With a zero-tolerance policy towards hooliganism, the Football Association of Uruguay made the decision to invest in technology that would recognise the relatively small number of individuals who could endanger and spoil the enjoyment of the many thousands of people attending the games.” When disruption occurs during a football match, images captured by the cameras are used by police and security personnel to identify and apprehend those involved. The images are then added to a database of undesirable attendees. The entire video data from every match is transferred into a large data system, maintained at the Ministry of Interior, to enable the police to retrospectively analyse key data The entire video data from every match is transferred into a large data system, maintained at the Ministry of Interior, to enable the police to retrospectively analyse key data and search for individual images over a period of years. IP cameras and video recorders Multiple Axis 20 Megapixel IP cameras from have been installed within the three stadiums in order to monitor seating and terrace areas, whilst high definition Axis Q6055 32x PTZ cameras are being used by operators to zoom into see close up detail of any incidents. In addition, Axis P1365 IP cameras chosen specifically to support facial recognition, have been installed at all entrances to each stadium, as well as in police mobile units located to monitor the streams of fans as they progress towards the stadium along the footpaths. The stadiums and the Ministry of Interior have been equipped with Wavestore X-Series recorders plus additional servers maintained on standby for failover purposes. All are 4U rack-mounted with 24 hot-swap hard drives. Data storage and analysis The client was also impressed by Wavestore’s robust data recording technology, which is extremely fast and enables specific video data to be located and displayed instantaneously A careful and detailed analysis of the network needed to support the aggregated bandwidth of all the cameras operating concurrently, as well as user demands at the various monitoring stations and display walls was carried out. According to German Ruiz, it is one of the many reasons why Wavestore’s high-throughput servers were chosen for the project. “The client was also impressed by Wavestore’s robust data recording technology, which is extremely fast and enables specific video data to be located and displayed instantaneously,” said German. “Exporting video clips from the Wavestore system is also very quick and easy, requiring just a 3-click process.” Commenting on the success of the project, Chris Williams, Project Director of Wavestore Global Ltd said: “As a British manufacturer we are proud that the quality and the price/performance ratio of our solutions is enabling us to win projects as far afield as Uruguay. Equally important, we are delighted to have proven our ability, and value the opportunity we have had to work with DDBA and Herta who have used their respective expertise to contribute towards the success of this prestigious project.”
Located in Raamsdonksveer, The Netherlands, Louwman & Parqui headquarters reside on a 30-hectare site just off the A27 and include the showroom ‘De Koepel’, a striking landmark designed by Richard Buckminster Fuller that showcases all the latest Toyota and Lexus models and incorporates offices where staff are responsible for all marketing and sales across the Netherlands. In addition, the site features a museum, Louwman‘s Toyota World, as well as workshops responsible for the maintenance of classic cars, the Louwman College and a logistics centre. Further, visitors to Louwman & Parqui are treated to an extraordinary sight of three camels that reside next to the car parks.ANPR is integrated into the system enabling reception staff to verify visitors and allow them access to the site IDIS Mobile app-powered monitoring System integrator, Ooperon, had already provided all aspects of access control at Louwman & Parqui, and based on the company’s expertise in both electronic and manned security and a truly partnership approach, Schoorl chose Ooperon for the surveillance upgrade. Other integrators proposed a mix of analogue and IP surveillance, while Ooperon offered a completely integrated security solution and an immediate migration to IDIS DirectIP that would prove both cost effective and simple to operate. The entire aging CCTV was completely replaced and integrated into Louwman & Parqui’s existing infrastructure and features a mix of IDIS Full-HD internal and external cameras with additional surveillance points added on the advice of Ooperon so that the entire facility is now strategically equipped with cameras. Automatic number plate recognition (ANPR) is also integrated into the system enabling reception staff to verify visitors and allow them access to the site. High quality images are providing high performance and user-friendly monitoring with no visible latency even from mobile phones via the IDIS Mobile app.The simple user interface makes retrieval of footage quick and easy Cost-effective integration In the summer of 2016, Rochus Schoorl, Louwman & Parqui’s Facilities Manager, realised that the incumbent surveillance system was outdated and no longer fit for purpose. There was limited backup capability, image resolution was not great, and retrieval of footage was slow and complicated. Schoorl reached out to several respected Dutch security systems integrators to find a system that was both reliable and intuitive—one that would give him the high-performance functionality he needed to effectively and efficiently secure the Raamsdonksveer site. Integrated into existing infrastructure has proven cost effective, while the IDIS Total Solution that Ooperon have installed is realising significant efficiencies by streamlining previously complicated, slow and manual tasks. The simple user interface makes retrieval of footage quick and easy, while IDIS NVRs provide the necessary storage and IDIS SmartFailover gives Louwman & Parqui the redundancy they were looking for. Future-proof scalability "We are incredibly satisfied with the IDIS solution that Ooperon has delivered. It has met with all our requirements and much more. The IDIS Mobile app has proved incredibly powerful and convenient when I’m away from the office. I can check whether lights are turned off in the evening or if a gate or door is left open and notify a guard immediately.” “The solution also offers us the future-proof scalability we were looking for to eliminate any future need to rip and replace and allows us to add further cameras and integrate other technologies as required. And, of course, the IDIS solution allows us regularly to monitor ‘our ladies’, the camels that live here on the site,” Rochus Schoorl, Facilities Manager, Louwman & Parqui.
GardaWorld’s cash handling business is North America’s largest, with its ubiquitous red and white trucks easily spotted throughout Canada and the United States. With hundreds of facilities and handling centers, GardaWorld processes currency for an entire continent, monitored by complex video surveillance technologies, working together to ensure the integrity of their processes and operations. Headquartered in Montreal, Canada, GardaWorld provides business solutions and security services. With over 62,000 staff globally, GardaWorld is one of the largest privately-owned security companies in the world, protecting people, assets, and reputations on a daily basis, performing critical tasks to protect and secure in an increasingly chaotic world. Efficient central monitoring When the time came to upgrade existing video surveillance operations for the company’s cash handling business as well as installations for the company’s newest sites, the task was complex with unique requirements and on a massive scale spanning two countries. IDIS technology, known for its power, flexibility, modularity, and low total cost of ownership, stood ready to meet the company’s needs.DirectCX TVRs were installed at legacy sites to ensure zero downtime for GardaWorld’s video surveillance capabilities Upgrading the legacy GardaWorld video surveillance solution across their 250+ sites required the installation of over 700 IDIS cameras and the establishment of two major central monitoring facilities. The inter-compatibility inherent in the IDIS Total Solution allowed the powerful and intuitive video management software (VMS) solutions, IDIS DirectCX and IDIS Solution Suite, to harmonise at GardaWorld central monitoring facilities. DirectCX TVRs were installed at legacy sites to ensure zero downtime for GardaWorld’s video surveillance capabilities, and IDIS DirectIP network video recorders (NVRs) were incorporated rapidly thanks to their ease and speed of installation and configuration. Reduced ownership cost The IDIS solution for GardaWorld was not only rapidly deployed thanks to the simplicity of DirectIP and IDIS VMS; the modernised monitoring system also comes with a low total cost of ownership due to a reduction of cabling cost thanks to IDIS DirectCX TVRs, the lack of any annual service management agreement or licensing fees for IDIS VMS, and less training time required from the single remote application used for managing each device on the system.IDIS solutions have proven flexible, scalable, and customisable to deliver the appropriate technology "IDIS meets our high standards and more with a surveillance offering that is as committed to our security requirements as we are. IDIS technology delivers powerful features and capabilities in a variety of ways that meet needs as diverse as our differing locations and custom requirements." "Whether analogue or IP networked solutions, new installations or upgrades, or at urban or remote sites, IDIS solutions have proven flexible, scalable, and customisable to deliver the appropriate technology in the ideal way for each requirement." "We are pleased with the partnership we have created with IDIS over the past year and look forward to the continued benefit we’ll receive from current and planned installations of IDIS technology," Guy Côté, Vice President and Chief Security Officer, GardaWorld. Integrating analogue and digital surveillance GardaWorld’s exceptional footprint and storied legacy in North America meant there was a highly varied set of conditions and requirements for optimising video surveillance operations. With a mix of existing analogue and digital surveillance in existing facilities and requirements for initial installations in newer facilities, GardaWorld articulated complex security needs for more than 250 individual sites throughout Canada and the United States, each requiring high quality video surveillance and networking with a mix of analogue and digital technology.The rollout of IDIS technology required training for operators and monitors of surveillance equipment Within individual facilities, existing video surveillance reflected a substantial level of upgrade complexity. The number of cameras at each site varied, with additional variances in age and operations for prior installations. Due to the nature of GardaWorld’s operations, it was imperative that no interruption of security monitoring would occur during the transition to IDIS technology. Further, the rollout of IDIS technology required training for operators and monitors of surveillance equipment at various locations, a potential challenge given the scale of the rollout and upgrades. Customisable security solution The ability of the powerfully modular and customisable IDIS Total Solution were an ideal fit for GardaWorld’s security needs, delivering benefits from the start, and are still ongoing, of the installation. GardaWorld benefitted from worry free integration of existing technologies and the installation of a flexible, customised solution that blended analogue HD-TVI technology with next-generation IP networked surveillance, as appropriate to each site, linked and managed by the powerful and highly customisable IDIS Solution Suite VMS. The installation met GardaWorld’s requirements for seamless upgrade and technology handover, minimising downtime and supporting the critical nature of GardaWorld’s operations.The seamless integration under IDIS’s powerful connectivity and simplified installation and use has reduced training time for GardaWorld staff Seamless security integration GardaWorld facilities now benefit from modernised, functionally rich cameras and recording devices that deliver clearer and smoother surveillance, and hasten an operator‘s ability to identify and mitigate potential incidents and fully review and respond to questions about operational security. The seamless integration under IDIS’s powerful connectivity and simplified installation and use has reduced training time for GardaWorld staff and eliminated the most common headaches associated with mass upgrades and new installations of security technology. Better surveillance and security operations for GardaWorld pass through to a more secure position for GardaWorld staff and customer assets around the world, further confirming GardaWorld’s place as a market and innovation leader in the security space.