Edge360 announced the launch of its new Video Management Software (VMS), Surveill VMS, which is the first fully containerised VMS running on micro services. Surveill VMS Surveill VMS was originally created to support the U.S. government on a global scale and now offers the private sector a true-enterprise surveillance technology that can scale with their business. “Edge360 makes products that are operationally-appropriate, specifically designed to answer to real-world issues in mission-...
March Networks, a global video surveillance and video-based business intelligence solutions company, is pleased to announce a new highly scalable Linux version of its Video Management Software (VMS) that can support up to 3,000 cameras on a single server. Command Recording Software The latest release of March Networks Command Recording Software offers unparalleled flexibility and scalability for customers. In addition to Windows systems, the software now works with Linux-based Operating System...
IMCO Group announced the acquisition of EMT Electronics Manufacturing Technologies Ltd. subject to suspending conditions. EMT specialises in the design, manufacturing, and testing of electronic circuits, and has been acquired for the amount of up to NIS 7 million, of which NIS 4 million will be paid at the closing, and an additional NIS 3 million are subject to future profit. The acquisition furthers the group’s strategy to be a one-stop-shop for customers in the security, defense,...
Snap One, an industry source of A/V surveillance, control, networking, and remote management products for pros announced that it will demo a range of new products for security partners and conduct two high-value giveaways at ISC West Stand #10053. “The Snap One team is eager to physically meet with our Partners to demo the newest surveillance, smart home security control, power management, networking, and mounting solutions that can help them tackle more installs,” said Cl...
Legacy access control systems use outdated technology that leaves them vulnerable to cyber threats, and can cause damage beyond the door, cautions Thibault Louvet, Director - Access Control Product Group at Genetec Inc. (Genetec), a technology provider of unified security, public safety, operations, and business intelligence solutions. With the average cost of a data breach being US$3.9* million in damages, it’s never been more important for organisations to be educated on...
Antaira Technologies, a globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the enhancement of its industrial networking infrastructure family, with the redesign of the LMP-2012G-SFP and LMX-2012G-SFP series. Antaira’s LMP-2012G-SFP and LMX-2012G-SFP series are industrial-grade equipment that is Ethernet ready, to fulfil various markets’ edge-level networking applications i...
With 13 participating companies and organisations, Israel will make an impressive presence in DEFEA Exhibition, in Athens, Greece. It should be noted that the close strategic relationship developed between Greece and Israel, now also expands in the field of defence industry. DEFEA Exhibition SIBAT, the International Defense Cooperation Directorate of the Israel MOD, will co-ordinate the country’s participation in a National Pavilion. SIBAT is positioned within the IMOD, while having a close, ongoing relationship with Israel's defence industry. This ensures that SIBAT maintains in-depth and updated knowledge of the defence world’s concepts, as well as a clear understanding of the Israel Defense Forces' (IDF) operational needs. SIBAT's facilitates international cooperation through various services: Generating Government–to-Government agreements. Initiating visits of official foreign delegations. Identifying cooperation opportunities and joint ventures with Israel defence industries. Locating technological solutions for specific requirements. Marketing and sales of IDF inventory. Organising the Israel national pavilions at international exhibitions. Israeli companies participating in DEFEA include: Aeronautics Group - Aeronautics Group, a globally renowned developer and manufacturer of defence solutions, based on unmanned-aerial systems and advanced ISTAR systems. The group provides integrated turnkey solutions, based on unmanned solutions payloads and communications for defence, HLS and civil applications. Aeronautics broad product portfolio offers combat proven solutions for intelligence, surveillance and reconnaissance (ISR) missions, with demonstrated excellent performance and operability. Sustained by continuous research and development, these systems are on the outcome of three decades of technological and operational experience aeronautics group offers a one-stop shop, cost-effective solutions, for defense, HLS and civil missions. Aitech Systems Ltd. - As a pioneer in the field of computing technologies, Aitech provides reliable, rugged COTS boards and embedded systems on industry-standard, open architectures VMEbus, VPX, CompactPCI and high-speed serial fabric-based computers and subsystems for use in defence, aerospace and space flight applications. Their products address the design challenges that system engineers face, by balancing the need for more computing performance and tighter system integration, with the appropriate risk mitigation and reliable system operation requirements. They offer cost-effective COTS boards and systems that meet the industry’s ever-evolving requirements, by offering design flexibility, optimal cost-to-performance ratios and continued technological advancements. Astronautics C.A. Ltd. - Astronautics C.A. Ltd. Israel, established in 1971, is a hi-tech defence systems company, working directly with end customers, integrators and OEMs. Their solutions for aviation include integrated avionics systems, civil-certified glass cockpit avionics, multi-function cockpit displays, avionics & mission computers, engine data systems, air data systems, navigation solutions for GPS denied environment, and embedded-cyber protected systems. Their systems are used onboard the most advanced fighters, transports, and helicopters. Their solutions for land systems include automated tactical artillery fire control systems for various artillery platforms, artillery battle management systems, combat vehicle computers, displays, & controllers. Their solutions for naval platforms provide highly accurate onboard navigation systems with advanced real-time data distribution solutions, including predictive algorithms that improve overall system accuracy, prevent jamming and spoofing, and provide cyber-attacks protection. In addition, we supply Operator control stations with WECDIS / ECDIS applications. Their systems are used onboard the most advanced surface vessels and submarines. Bet Shemesh Engines Ltd. (BSEL) - Bet Shemesh Engines Ltd (BSEL) has been Israel’s leading jet engines house since 1968, manufacturing & casting jet engine parts, providing MRO services, as well as delivering small jet engines self - developed for UAV’S. The maintenance repair & overhaul (MRO) division of BSEL, being OEM, FAA & EASA certified, provides overhaul, repair & engineering services to complete P & W F100 and PT6A engines, and Rolls Royce (Allison) M250 engines; as well as to modules, components and accessories. Elbit Systems Ltd. - Elbit Systems Ltd is an international high technology company engaged in a wide range of defence, homeland security and commercial programs throughout the world. The company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land, and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (‘C4ISR’), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios and cyber-based systems and munitions. The company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems. EMTAN KARMIEL LTD. - EMTAN, is an Israeli manufacturer of small arms, guns and weapons with over 40 years of experience and knowledge. EMTAN employs over 120 skilled personals in a sophisticated computerise facilities that ensure optimised manufacturing and quality assurance all this in order to deliver the end-user a reliable robust weapon within budget. They manufacture the MZ Rifle range, which includes MZ-4 Fully Automatic rifle in caliber 5.56 NATO, MZ-4 P Piston operated Fully Automatic rifle in caliber 5.56 NATO, MZ-47 Fully Automatic rifle in caliber 7.62X39 to suite AK47 magazine and accessories, MZ-10/25 S Semi-Automatic rifle in caliber 7.62 NATO for snipers, MZ-300 Fully Automatic rifle in caliber 300 Blackout for operations with silencers, MZ-9 Fully Automatic sub machine gun in Caliber 9mm NATO, MZ-15 Sami Automatic DMR rifle in caliber 5.56 NATO and RAMON Pistol 9mm. Nir-Or Israel Ltd. - Nir-Or Israel Ltd. designs develops, manufactures, and integrates innovative electronic systems and products for a vast range of military applications at land, air, and sea. Developing ideas into prototypes and prototypes into fielded, operational products, the company's wide-ranging capabilities cover all aspects of electronic-based military and para-military solutions. Nir-Or line of solutions includes Multi-dimensional Situational Awareness, AI-powered, Video System (Video Servers, Ruggedised Displays and Camera Clusters) for APC and designated military platforms. Nir-Or is also an important defence solutions provider of the IDF, providing its video systems to the new Namer APC. Israel Aerospace Industries (IAI) - In a fast-evolving world, where adversaries constantly challenge national defense, you need experienced and skillful allies to rely on. A trusted partner, courageous and innovative to deliver the capabilities you need and afford. That's IAI – Where Courage Meets Technology. A renowned company in defence, aerospace, and commercial markets, IAI leverages state-of-the-art technology and decades of combat-proven experience, delivering solutions for national defence and security challenges. Delivering large turnkey projects, IAI acts as a prime contractor, subcontractor, and team members in dozens of large programs for the aerospace, land, sea, and cyber domains and multi-domain applications. They offer a vast portfolio producing air and missile defense, unmanned aerial systems (UAS), ground robotics, precision-guided weapons, and loitering munitions. They deliver special-mission aircraft, modernise military aircraft and helicopters, and convert passenger jets into cargo aircraft. Their technology expertise features systems and solutions from reconnaissance satellites and radars, to all aspects of command, control, and communications, computing and cyber, intelligence, surveillance, and reconnaissance systems. Israel Weapon Industries Ltd. (IWI) - IWI has been a globally renowned company in the production, marketing, design and development of unrivalled weapons for over 85 years. Their weapon systems include the new CARMEL & ARAD AR, X95 (AR & SMG), TAVOR & GALIL ACE AR, NEGEV LMG, GALIL SNIPER, DAN Bolt Action Sniper Rifle, UZI PRO SMG and the JERICHO & MASADA pistols. IWI also provides Riot-Control solutions, including offensive and defensive products, top-level methodology, tailored training and integration of cutting-edge technologies. IWI customers are: Governmental, Military and Police Entities, as well as Law Enforcement Agencies around the world, along with commercial markets. JV Plasan SK (Plasan) - Founded in 1985, JV Plasan SK is a global company in offering safer vehicle environments and survivability solutions for defence and security forces. Their solutions offer high-end protection and mission readiness for defence and security vehicles, while reducing operational costs. With extensive battlefield experience and expertise in automotive systems, and materials, Plasan deliver solutions to support even the most complex vehicle and team missions. Plasan offers a variety of vehicle protection solutions, including advanced kitted armor hulls, the Guarder and SandCat armored tactical vehicles, and a wide range of survivability and personal protection solutions. Plasan, a recognised innovator and international provider of state-of-the-art lightweight ballistic protection and survivability solutions for the war fighter, the peacekeeper and law enforcement personnel alike, provides customised survivability suites that offer a unique optimisation between protection, mission adaptability, payload and cost. With its many design wins, Plasan has emerged as a global company in providing the right solution at the right price. With three decades of experience and over 32,000 vehicles across the globe fitted with our protection solutions, Plasan has a unique understanding of the challenges found on the modern battlefield. They translate operational needs into high-end protection solutions. With a comprehensive and creative approach to vehicle protection and armored vehicles, and the ability to provide customised solutions for a wide variety of missions, Plasan’s expertise in engineering, manufacturing, and system integration has been a major differentiator for their customers and partners. The company offers comprehensive solutions for the optimal balance of performance, survivability and safety. Plasan helps create a safer, mission-ready vehicle environment for defence and homeland security forces. RAFAEL Advanced Defense Systems Ltd. - RAFAEL Advanced Defense Systems Ltd. is synonymous with Dynamic Defence, Daring Innovation, and Technological Ingenuity. For over 70 years, the company has pioneered advances in defence, cyber and security solutions for air, land, sea, and space. Their innovations are based on extensive operational experience and understanding of evolving combat requirements. They enable the rapid development of effective solutions for complex battlespace challenges. Always ahead, they ensure an ongoing advantage for their worldwide client base. They are dedicated to continuously enhancing their customer service, as well as expanding their global industrial cooperation programme. Smart Shooter Ltd. - Smart shooter develops intelligent fire control systems for small arms that significantly increase weapon accuracy and lethality, when engaging static and moving targets, on the ground and in the air, day and night. With proven ‘one shot - one hit’ precision, their SMASH product line empowers defence and security forces, by maximising rifle effectiveness against enemy targets, while minimising friendly casualties and collateral damage. Based on artificial intelligence (AI), computer vision and machine learning technologies, SMASH is also designed to interconnect with other operational resources to form a micro-tactical network that delivers real-time situational awareness.
The FlexPower Global Series (FPG) from LifeSafety Power, designed to provide DC power for access control systems in international applications, is now PSE listed for Japan and compatible with the country’s 100VAC applications. LifeSafety Power’s renowned FlexPower power supply line continues to expand its reach to new markets, bringing reliability and safety to connected access control and security solutions. The FPG family is engineered with power factor correction and a universal AC input allows operation on any input voltage, from 100-240VAC at 50-60Hz. FlexPower Global Series (FPG) FPG Series is compatible with LifeSafety Power’s NetLink network communication modules FlexPower Global Series (FPG) is also compatible with LifeSafety Power’s award-winning NetLink network communication modules, allowing automated remote battery load testing, AC input voltage measurement, email alerts on fault conditions and more. With the addition of PSE certification, FPG now carries listings and approvals for the U.S., Canada, Europe, India, Mexico, Japan and others (UL, CE, PSE, BIS, RoHS). Expanding the reach of power-connected solutions “Meeting power requirements in new countries effectively expands the reach of power-connected solutions,” said John Olliver, Senior Vice President of Sales & Marketing for LifeSafety Power, who also handles international sales. John Olliver adds, “For the systems integrator and end user, they can rely on our power solutions for all of their global account customers and meet power requirements consistently around the world.” Available in wall- and rack-mount applications The FlexPower Global Series (FPG) from LifeSafety Power is available in wall- and rack-mount applications, has a lifetime warranty and includes a metal cover over the PCB for European compliance.
Hikvision, the globally renowned manufacturer and supplier of security products and solutions, now offers a line of smart PoE switches, designed to simplify installation, remote management, and system maintenance. EI Smart Managed Switches The new Hikvision EI Smart Managed Switch portfolio includes a host of unique features, including advanced visualised topology, network health monitoring and real-time alarm notifications. “Our new EI Smart Managed Switch offering combines the ideal combination of performance, functionality and cost efficiency, to best manage new or expanded networked systems,” said John Xiao, Vice President Marketing, Hikvision USA. Advanced health monitoring and notification John Xiao adds, “Designed specifically for professional surveillance and security applications, our new EI Smart Switches can help reduce system downtime, by providing system administrators with advanced health monitoring and notification features.” The new IEEE 802.3af, IEEE 802.3at PoE compatible Hikvision EI Smart Managed Switches are available in 4, 8, 16, or 24 port configurations, rated at 100 Mbps. Key features of Hikvision EI Smart Managed Switches include: Visual Topology Management, which provides a unique 2D visual layout of networked devices, when used with Hikvision’s iVMS-4200 or HikCentral camera and system management platforms. The visual topology feature provides administrators with a convenient view of their entire network of connected devices, making systems easier to build and maintain. Network Health Monitoring allows system administrators to view the real-time bandwidth of the network and device details at both ends. Real-Time Alarms and Notifications significantly reduce network operation and maintenance costs, by automatically notifying system administrators, when network bandwidth exceeds predetermined thresholds. The affected camera tile will also turn red on the visual topology, in the event transmission is interrupted.
It is the end of the line for analogue phone systems, which can leave alarm companies hanging out to dry, trying to figure out if they need to replace costly alarm panels. With the impending shutdown of the analogue telephone network, alarm monitoring companies nationwide need to come up with a game plan. It is more important than ever for security companies to equip themselves with the knowledge of what new technology solutions are available in the marketplace, in order to help offset the costs of transitioning away from analogue. Technology transformation With the biggest transformation facing alarm companies being technological advances in communications, everyone can agree that the traditional analogue telephone network is on its way to a complete shutdown. Whenever a major technology, especially one with a long history of regulation, approaches the end of its life, being prepared and ready for the transition is the key to success. With any technological disruption comes major change, but alarm companies need to be able to adapt quickly to survive and thrive in the ever-changing world of technology. In the past, traditional phone lines used circuit switching technology delivered over a copper line to send the alarm and data communication signals to the alarm monitoring company. Over the last couple of decades, technology-specific services have been migrating to packet switching over the public Internet, in the form of Voice over Internet Protocol (VoIP). Voice over Internet Protocol (VoIP) VoIP is a telecommunication service that takes analogue audio signals and converts them into digital data VoIP is a telecommunication service that takes analogue audio signals and converts them into digital data that can be transmitted over standard internet connections. While this transition has provided the opportunity for tremendous cost savings and more reliable connections, VoIP protocols have been designed with voice service in mind. This means that traditional alarm panel and modem protocols are seen as no longer compatible with these technological improvements. These changes are sweeping across an array of industries including security installers, fire monitoring, field medical monitoring, and alarm monitoring. As the analogue network is growing closer to becoming obsolete, alarm companies are facing a myriad of challenges. The ever more rapid advancement and adaptation of new technologies has left a gap in legacy communication systems. Ethernet-based VoIP systems E1/T1 and analogue POTS lines are increasingly being replaced by Ethernet-based VoIP systems, leaving alarm companies left with modem-based technology that can no longer work within the new infrastructure. With most telephony connections moving to VoIP, it can be costly for alarm companies to replace existing modems and alarm panels. Most are looking for a simple solution to help make a seamless transition without having to change their entire infrastructure. Replacing existing analogue infrastructure Time is of the essence for alarm companies nationwide that rely heavily on equipment and endpoint devices that use modems to communicate. In most cases, these modems cannot be replaced due to the high costs associated with replacing the existing infrastructure. With new requirements for fire alarm control panels, the pressure is on them now more than ever to react quickly and find a cost-effective solution. With limited options out there, one company has done their due diligence and launched a revolutionary solution that offers a clear path forward for the industry. Voice, video, and fax and data communications VOCAL Technologies has been leading the way, since 1986, in the design of software and hardware solutions VOCAL Technologies has been leading the way, since 1986, in the design of software and hardware solutions, under licence for voice, video, and facsimile and data communications. The company develops and applies advanced technologies for superior voice, video, fax and data communications. With a broad range of innovative design solutions that yield the highest quality communications at a lowest cost and an insight into the technical challenges of the telecommunications industry, it was natural for them to develop a unique solution, in order to help navigate companies through the VoIP revolution. As the security industry continues to evolve and face many challenges with the move from analogue to VoIP phone lines, VOCAL Technologies knew it was the right time to develop a combined software and hardware solution. Their goal was to throw out a lifeline to help alarm companies transition easier and more efficiently. VOCAL SIP Analogue Modem Server With cloud-based modems now a firm reality, the VOCAL SIP Analogue Modem Server, or SAMS, is a unique IP-based software solution for inter-operating with legacy modems, without the need for modem banks with E1/T1 connections. This Virtual Modem Server allows a business to deploy a server in the Cloud, which can work with the modern VoIP phone network infrastructure based on SIP and RTP, instead of using T1/E1 lines to connect to the PSTN. Virtual Modem server The Virtual Modem server contains true soft modems and not just an AT command set on a TCP socket pretending to be a modem. This allows the server to connect to true voice band modems deployed on the PSTN, and thus, does not require installation of additional equipment on the far end of the security system. Alarm monitoring centres are not left out of these significant advancements in communication infrastructure. Supporting industry standard alarm protocols, including Ademco Contact-ID, Sonitrol, DC-03/FSK, Pulse, and SIA-2000, the modem server can also act as a virtual replacement for physical alarm receiver equipment. Modem over IP (MoIP) solution SAMS provides a true Modem over IP (MoIP) solution and can support a broad range of remote endpoints SAMS provides a true Modem over IP (MoIP) solution and can support a broad range of remote endpoints. Bringing in expertise from numerous industrial market sectors, such as Utility Metering, Point of Sale (PoS) payment processing, SCADA, Out of Band management, among others. SAMS is a perfect choice for alarm companies. Even when traditional ISDN and POTS lines remain available, Alarm Receiver and Remote Access Server (RAS) equipment like the AS5350 has reached end of life and these vital business systems are left in a state where failure is imminent and quick repair or replacement are no longer options. This can happen with servers interacting with alarm systems and security panels. M2M applications rely on data modems Countless M2M applications rely on data modems to accomplish their task and VOCAL has launched a few solutions to allow these applications to adapt to the changing infrastructure. VOCAL servers come in a variety of configurations, which cover the full range of ITU V-series modems, as well as many other industry standard modulations. This allows it to fit easily into existing systems and flexibly meet the needs of already deployed infrastructure and applications. VOCAL continues to customise all solutions for customers and can meet specific system requirements, when necessary. IP switchover When it comes to end-of-life modem products, VOCAL’s SAMS software is a great replacement solution for Cisco’s Access Servers (2500 series, AS5350), Cisco PVDM Digital Modem Modules (PVDM2-12DM, PVDM2-24DM, PVDM2-36DM), modem server banks, alarm receivers, and groups of individual hardware modems. VOCAL is helping alarm companies that are currently using ISDN for PSTN access to their modem servers as SIP-based VoIP will be the replacement for ISDN. The cost savings brought on by switching from expensive ISDN and analogue lines to VoIP has made the IP switchover a desirable transition instead of a painful requirement. Integration with SIP infrastructure Integrating the modem infrastructure and the SIP infrastructure has become more and more necessary Integrating the modem infrastructure and the SIP infrastructure has become more and more necessary. Ideally, running modems on the cloud server, connected to a SIP infrastructure would be the best scenario. Using a Cloud Modem Server, such as VOCAL’s SIP Analogue Modem Server (SAMS), allows alarm companies to get the benefits of the SIP infrastructure, without having to replace the legacy pieces of their alarm panels which can be costly. Remote modems The server can run in the data centre, where all of the company’s other network facing services reside, which can save money and facilitate changing business models that are moving away from physically located hardware and into remote virtual working environments. As the controlling application, the SAMS server is seen the same way as any other modem. The remote modems can call the SAMS server from the PSTN (or be called) as they always have. The SAMS server behaves as a bank of modems connected to ISDN would, all while running on off the shelf hardware or any standard virtualised environment. Analogue Modem Adapter (AMA) In addition to their software solution, VOCAL also introduced an Analogue Modem Adapter (AMA) to the marketplace, which is a device that enables analogue modems and alarm panels to securely transmit data over digital networks. The AMA connects legacy alarm, POS, voice, fax and other analogue devices to IP networks including mobile, radio, and satellite networks. This is a great option for alarm companies that have analogue and modem-based equipment but no longer have phone lines available and want a secure connection. Open line of communication An AMA provides a modular phone jack and an Ethernet port where an analogue device, such as a Digital Alarm Communicator Transmitter (DACT), can be connected to the modular jack to transmit directly over IP network. This eliminates the need for telephone landline connections. An AMA supports telephony features such as dial tone, device power, ringing and standard telephone signaling to communicate with the local modem. Combines with SAMS server installation VOCAL’s AMA software is part of a fully integrated and highly configurable VoIP software solution Combined with a SAMS server installation, VOCAL’s AMA creates a novel approach to bypassing the data and alarm protocol issues that are introduced by last mile IP connections and line emulation devices utilised in VoIP infrastructure. VOCAL’s AMA software is part of a fully integrated and highly configurable VoIP software solution with a network stack, SIP stack, secure communications, and full-featured telephony software with a comprehensive data modem software library. Making the VoIP transition VOCAL continues to work with alarm companies nationwide to help make the VoIP transition a smooth one with a combined hardware and software solution that is second to none. It is important for alarm companies to research the options available to them and continue educating themselves as the end of the line grows closer for analogue phone systems. In the past, the security industry has always been on the forefront of adopting new technologies and with VOCAL on their team, the paradigm shift to VoIP can take place seamlessly. By bringing together a combined software and hardware solution, VOCAL has taken a technical disruption and turned it into a graceful transition for alarm companies that will keep the lines of communication open now and well into the future.
Pivot3, the globally renowned company in intelligent software for simplified security and surveillance infrastructure solutions, has announced the release of the Pivot3 Surveillance Series Edge, an optimised product offering for edge and distributed physical security environments. Surveillance Series Edge Surveillance Series Edge incorporates the same Acuity software-based intelligence and automation used by all Pivot3 Surveillance Series solutions, in order to deliver higher levels of resilience, management simplicity and efficiencies than infrastructure, based on basic video recording servers or separate servers, and storage systems. Video surveillance, video analytics and other security applications are being deployed at remote and distributed edge sites at an increasing rate, to protect people and critical assets at those locations, and to derive more real-time insights from video and other data. Overcoming latency and bandwidth issues Having these applications deployed at remote sites help overcome the latency and bandwidth issues Having these applications deployed at remote sites help overcome the latency and bandwidth issues that are associated with moving that data back to a central location for processing. This necessitates the need for infrastructure at the edge that will provide flawless capture of video, without dropped or degraded frames, and ensure applications never go down and be simple to manage locally or remotely. “The need to capture video at the edge is expanding rapidly in tandem with the growing volume and importance of surveillance at remote sites,” said Anna Sliwon-Stewart, Senior Analyst and Research Manager at Omdia. Hyper-converged infrastructure Anna Sliwon-Stewart adds, “Easy to manage storage solutions for distributed physical security environments will be even more needed in the future, as they make it easier for installers to deploy modern, innovative video surveillance systems.” Ideal for remote and distributed environments in the transportation, critical infrastructure, energy/utilities, and retail markets, Surveillance Series Edge provides simple, efficient, and highly available storage and servers, in the form of hyper-converged infrastructure that scales from supporting 60 to over 400 video surveillance cameras at the edge. Integrated virtualisation technologies Due to integrated virtualisation technologies, other applications at the edge sites, such as access control, visitor management or intrusion detection can be consolidated on Surveillance Series Edge, in order to further reduce costs and realise the benefits of shared resources and advanced resilience. Surveillance Series Edge is based on Pivot3’s Acuity software platform with its Intelligence Engine that automates numerous tasks, including performance optimisation, data protection, application failover, predictive monitoring and analytics, and orchestrated system updates and upgrades. Intuitive Pivot3 Management Application Surveillance Series Edge systems can be managed locally or remotely, using the Pivot3 Management App Surveillance Series Edge systems can be managed locally or remotely, using the intuitive Pivot3 Management Application, without requiring specialised IT skills. This same management console can also simultaneously be used to centrally manage and monitor multiple Essentials by Pivot3 video recording servers, as well as non-Pivot3 security servers, using the recently introduced Pivot3 Surety software. “With the requirements at remote, distributed sites becoming more demanding, Surveillance Series Edge is the right solution at the right time,” said Ben Bolles, the Vice President of Products at Pivot3. Software-based intelligence and management Ben Bolles adds, “This solution right-sizes our enterprise-class Surveillance Series for edge deployments with the same software-based intelligence and management, so our customers do not have to compromise on capabilities.” Surveillance Series Edge is the latest addition to Pivot3’s comprehensive portfolio of infrastructure solutions, purpose built for physical security environments of any size or complexity, with software-based intelligence that lowers risk and overall TCO (Total Cost of Ownership). Surveillance Series Edge is available to order now.
Allegion U.S., a provider of security products and solutions announced the unveiling of its next-generation reader controller – the Schlage RC. This new innovative device combines the power of the Pure IP™ access control technology pioneered by ISONAS with Schlage’s intelligent hardware and credentials, delivering a comprehensive and cost-effective perimeter solution to customers. Scalable and flexible solution The benefits of having a panel and reader in a single enclosure not only eliminate the need for multiple devices but create a simplified architecture with the ease of installation. Customers have the power to leverage their existing infrastructure with this scalable and flexible solution. The Schlage RC reader controller complements the broader Schlage ecosystem, including the Schlage NDE and LE wireless locks, for a complete interior and exterior solution. It is also compatible with Schlage credentials, including 125 kHz proximity, 13.56 MHz smart, 2.4 GHz mobile, and NFC. Secure, comprehensive IP/PoE solution An IP/PoE solution that creates a simple install process and reduces the overall costs of deploying an access control solution “We are excited to be able to offer a secure, comprehensive IP/PoE solution to customers that creates a simple install process and reduces overall costs of deploying an access control solution at their facility,” states Mark Casey, Director of National Electronic Sales at Allegion. “And since the new RC is designed to work in the same system as Schlage NDE and LE wireless locks, employees and staff members can also use their electronic credentials on offices, equipment rooms, storage closets, and sensitive spaces.” Perimeter and touchless applications The Schlage RC reader controller is the perfect hardware solution for perimeter applications where access control software is used to manage doors across single or multiple sites. It integrates easily with open Physical Access Control Software (PACS) systems. Allegion offers a complete portfolio of IP and mobile-enabled devices, as well as life safety and touchless hardware to customise electronic access control across a variety of popular applications and openings. Real-time access control The Schlage RC reader controller opens the door to real-time access control by connecting directly to the IT network via a single PoE cable, which simplifies and creates a seamless installation. By eliminating the need to run separate power to the door, deployment time is significantly reduced. It provides connectivity that is secured using industry-standard TLS 1.2 encryption and offers both a cohesive look and an advanced feature set. There are three multi-technology reader-controller models available that allow for common mounting options, which include the RC11 mullion mount, RC15 single gang mount, and RCK15 (a single gang mount with keypad).
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offices and other workspaces will be tasked with supporting a hybrid work solution, as well as increasing hygiene measures. Video intercom solution This is where an IP video intercom solution can assist. Below are four ways they can help usher in a smarter, safer work environment: Video intercoms assist in creating a more hygienic work environment - The outbreak of COVID-19 has raised awareness of germs and just how easily a virus can be transmitted by face-to-face contact. Germ barriers are popping up in many aspects of our daily lives, where we were not likely to see them before Unfortunately, the door is also the easiest of these germ barriers to breach As such, we’re becoming accustomed to seeing plexiglass barriers at restaurants, grocery stores, and even coffee shops. However, many don’t realise that one of the best germ barriers is a simple door. Unfortunately, the door is also the easiest of these germ barriers to breach. All it takes is a knock or a doorbell ring to make us open our germ barrier and be face-to-face with whomever is on the other side. Increasing hygiene safety A simple step to increase hygiene safety and visitor security in commercial buildings and workspaces is an IP video intercom. Installing a video intercom will allow staff to see and speak with visitors without breaching that all-important germ barrier. A video intercom system provides a first line of defence, enabling the user to visually confirm the identity of the person on the other side of the door first before granting access. It can also be used to make sure proper procedures are being followed before a person is allowed to enter, such as using hand sanitiser, wearing a mask, and following social distancing guidelines. Basic security needs A major topic of conversation the past year has been how to manage occupancy in all facilities Video intercoms for occupancy management and basic security - A major topic of conversation the past year has been how to manage occupancy in all facilities—ranging from grocery stores and retail shops to restaurants and commercial buildings. Workspaces and offices are no exception. A video intercom provides a quick and convenient method of seeing who, or what, is on the unsecure side of the door before opening. For basic security needs, if a business has a door opening into an alley, a video intercom would be used to ensure no one is waiting outside to force their way in when the door is opened. Personal protection equipment Such solutions can also be used to ensure a person is carrying proper credentials, or wearing proper personal protection equipment (PPE), before entering a sensitive area. For example, if a lab has a room which can only be accessed by two persons at a time wearing specific protective gear, a video intercom could ensure each person is properly equipped, before allowing access that particular room. Additionally, for office or workspaces that have shared common areas, such as a cafeteria, gym or even conference rooms, managing access to these spaces will remain a priority, especially with post-pandemic restrictions in place. Video intercoms are a comprehensive safety and security tool for any workspace Deliveries of packages, work-related materials, or even food are common in any office or workspace. Video intercoms can assist in facilitating safe deliveries by visually and audibly confirming the identity of the individual. The visitor could be your next big client, your lunch delivery, a fellow employee with a faulty access card, or your mail. Video intercoms are a comprehensive safety and security tool for any workspace. Visitor management systems Video intercoms provide a cost-effective solution in small to mid-sized office facilities - One significant advantage of video intercom systems is the variety of applications available. Systems range from simple one-to-one video intercoms, to buzz-in systems, to full-fledged visitor management systems in mixed-use buildings. While they might lack the resources and manpower many enterprises have, small-to medium-sized offices can also take steps to ensure the safety of their staff and customers. Like any business, controlling who comes into the building is a primary way of maintaining safety. Video intercoms work in conjunction with access control systems to provide an identifying view of visitors or employees with lost or missing credentials. They allow staff to both see and hear those on the unsecured side of the door to determine intent before granting access. Most quality video intercoms will provide a clear enough image to allow an identification card to be read by holding it close to the lens, adding another opportunity to verify identity. Touchless intercom activation One major trend is the option of providing a touchless door activation Video intercoms provide a touchless option - Even prior to COVID-19, one major trend is the option of providing a touchless door activation or touchless intercom activation of a video intercom for those without proper credentials. Though touchless isn’t a new solution to the access control market, the pandemic introduced a renewed focus on these types of solutions to provide hygienic access to visitors. For offices and other workspaces looking to make investments into post-pandemic solutions to assist in reopening, touchless can support these efforts. When it comes to smart, secure workspaces, many people think instantly of cameras or monitors, access control, and alarm systems. Proper access credentials However, video intercoms are often the missing piece of a building’s security puzzle. A video intercom provides an identifying view that is not always available from a camera covering a large area. They allow those without proper access credentials a method of requesting entry, and just like cameras, they can be activated by alarms to allow staff to clearly see and communicate. If a workspace or office is important enough to be secure, it’s important enough to be sure of who is there before the door is opened. In 2021, it’s not enough to ensure the physical security of your staff and visitors, but also to ensure they are accessing a hygienic environment. Video intercoms provide that security and peace of mind.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types of access control authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organisations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasise, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organisations want to use smart phones in their upcoming access control implementations. Smart phone access control is secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices.All that should be needed to activate newer systems is simply the phone number of the smart phone Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone. Bluetooth and NFC the safer options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defence of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging systems could cause problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organisations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organisations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analogue to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labour are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergised and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission critical video surveillance solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralised storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralised data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate access to video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance of video in risk mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying the right video server equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyse the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analysing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analysing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analysing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video transmission and privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs. For example, while some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximise accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR for physical security professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organisation, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organisation.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specialises in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting video surveillance systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
The Palmetto Plaza Shopping Mall, an iconic shopping center located in Cali, Colombia, opened its doors in 2004 thanks to the support of a group of entrepreneurs from the region who dreamed of a place where local residents and tourists can find a wide range of commercial services and entertainment offerings. Need for a video surveillance solution To ensure a safe environment in the shopping center, mall officials sought a comprehensive video surveillance solution that can monitor the areas in and around the mall, including its square, corridors, parking lots, and the surrounding roads. Dahua Technology, in cooperation with its partner in Colombia - Fortox Security Group - a security consultant with a nationwide presence, jointly designed an AI-enabled Smart Retail Solution that replaced the shopping mall’s old CCTV analog system. Addressing the challenges The migration project from the analog CCTV to a networked system began with the design and implementation of structured cabling – using both fiber optics and copper – until the right and suitable CCTV solution is determined. The Palmetto Plaza Shopping Mall entrusted Fortox as its security consultant tasked to search for a technology that can facilitate the important steps toward the optimization and operation of the mall in the service of the city. Dahua’s AI-based portfolio Dahua offers AI applications within its portfolio, which allowed to transcend to a system dedicated to security & control " "When conducting the evaluation of the solutions offered in the market, we decided to work with Dahua because the company offers artificial intelligence applications within its portfolio, which allowed us to transcend from a system dedicated solely to security and control, to a system which will also contribute to other areas of the shopping center, integrating the Smart Retail solution into the circuit, and offering BI statistics to the mall for further analysis.” “In addition, we integrated the temperature monitoring solution and visualisation control into the system using a Dahua video wall,” explains Mr. Efren Mauricio Matabanchoy Romo, Project Engineer at Fortox Security Group. IP, dome, and PTZ cameras Dahua Technology provided 111 pcs of high-resolution IP cameras, panoramic cameras, dome cameras, and pan-tilt-zoom (PTZ) cameras with 30x optical zoom capability for the project. The Dahua cameras were installed in strategic locations to provide comprehensive security for employees and customers. The video feed, which is transmitted to the central monitoring stations inside the mall through a private network, can assist the security personnel in identifying emergencies, vandalism, and other situations where a quick response from the security team is necessary. Real-time monitoring solution The video surveillance system was designed to capture high-quality HD images, combined with advanced technologies to support embedded intelligence functions, such as sending an alert to the monitoring center when it detects abandoned or missing objects, unauthorised entry into a prohibited area, as well as facial recognition and other defined activities. The cameras support multi-streaming that allows images to be recorded and monitored with real-time high resolution The cameras also support multi-streaming that allows images to be recorded and monitored with real-time high resolution so that operators can have a clear and well-defined view of both live and recorded footage. IP video surveillance system Dahua Technology and its dedicated engineering team carried out the construction of this design by utilising its high-quality hardware and software products, with a great focus on solving the pain points of the shopping center and generating an added value to its visitors and internal customers. Mr. Chao Wu, General Manager of Dahua Technology Colombia, said, "As a result of excellent teamwork, we were able to implement more than an IP video surveillance system. We designed a solution with the latest technology and artificial intelligence unique in the city of Cali, which allows the Palmetto Plaza to provide greater security to its visitors and trade merchants.” 24/7 monitoring features In terms of security, through the Dahua equipment installed by Fortox, the Palmetto Plaza is now able to perform 24/7 monitoring and intelligent data analysis. "Likewise, through the Dahua Smart Retail Solution unique in the city of Cali, we generate added value to the merchants who have placed their trust in Palmetto Plaza. Smart Retail is not only a solution that guarantees maximum security for customers in the shopping centre.” “It is also a revolutionary new tool for Big Data statistics that is suitable for the mall´s management, allowing them to make efficient and correct decisions depending on the situation”, Mr. Wu added. Security management The Dahua Smart Retail Solution has significantly improved the security management of the Palmetto Plaza Shopping Mall. By increasing the resolution of the cameras, the visual records of the CCTV system are now optimised and strengthened. By increasing the resolution of the cameras, the visual records of the CCTV system are optimised & strengthened The updated network system provides video recordings with HD resolution, allowing operators to better control and manage the entire system. It also offers artificial intelligence analytics such as face recognition focused on security, business intelligence focused on real-time statistics of the number of shoppers in the mall, and monitoring of behavior within its facilities. CCTV network system In addition to its video surveillance products, Dahua Technology also contributed to the system migration project of the Palmetto Plaza, transforming its analog CCTV system to a CCTV network system with higher resolution cameras, 360-degree views, and artificial intelligence analytics. Dahua Technology also provided complete technical support and commercial services that include training operators and managing configuration settings. “We had devices that already completed their useful life. These devices did not meet our security needs due to their low resolution and constant failures,” says Mr. Juan Diego Guzman, Security Director of Palmetto Plaza Shopping Mall. Surveillance capability For Sandra M. Navas P, General Manager of the Palmetto Plaza Shopping Mall, this technology has generated more confidence among visitors and merchants. "The beginning of this system implementation has put us at the forefront of Colombian retail in terms of video surveillance capability, and has also allowed us to achieve a level of satisfaction in terms of security higher than 92%." Furthermore, this system has allowed Fortox as a security company to integrate into a single technology the requirements requested by the client, successfully delivering the required services needed in the shopping centre.
Highland Community College’s mission is to meet the needs of the Greater Northwest Illinois community through quality educational and cultural programs. The College serves thousands of students at its Freeport campus and satellite locations throughout the district. The institution offers comprehensive academic programming with over 60 degrees and certificates. Addressing challenges On any given day, thousands of students and hundreds of instructors can be on campus at Highland Community College. To ensure everyone’s safety, the institution wanted to prepare emergency response plans in the event of a tragedy. Whether it was a natural disaster or a human-made crisis, the College needed a dependable system to transmit communications throughout the campus to students, teachers, and visitors. IP voice network The College needed to build a robust IP voice network for the emergency phone system without high costs or disruption Highland Community College needed to build a robust IP voice network for the emergency phone system without high costs or disruption. The College has eight main buildings that were constructed over four decades. The existing phone system was a 12-year-old digital PBX that was no longer supported, and spare parts were becoming difficult to find. The institution wanted an IP phone solution. However, due to budget constraints and security concerns, the College wanted to keep voice communications traffic on a separate network. The College did not want to layer voice on the data local area network (LAN) and go through the disruptive and expensive LAN readiness requirements. PoE switch Due to the project’s challenges, Highland Community College’s telecom provider, ATI, recommended NVT Phybridge Power over Ethernet switch innovations. The NVT Phybridge PoE solution would leverage the campus’s existing and reliable CAT3 infrastructure to create a robust IP backbone for the new IP phone system. The NVT Phybridge switch also extends connectivity up to four times farther than standard solutions, providing new capabilities and flexibility in network design. The College was impressed with the solution and decided to move forward using the NVT Phybridge switch. IP phone system ATI was able to install, configure, and test the new IP phone system in just a few days without complex integration issues with the data network. “Installing the NVT Phybridge solution was incredibly smooth,” said Tom Bruehler of Highland Community College. “There was a week allocated for the implementation, and the entire 8-building campus was up and running in just a few days.” Reliable and quality service The customer maintained its physically separate voice network while modernising to IP The customer maintained its physically separate voice network while modernising to IP, increasing reliability and overall quality of service. The College was impressed with its new robust voice and data communication capabilities. The extended reach capabilities of the NVT Phybridge solution ensured that all PoE equipment was consolidated in one location, significantly reducing the network’s cost and complexity.
An American sports broadcasting network wanted to modernise to an IP communication solution without disrupting its 24/7 operations. The organisation was relying on a digital phone system that was obsolete and becoming increasingly inefficient and costly. However, the existing phone system was supported by a single-pair UTP infrastructure that was not ready to support the new IP devices. While the customer wanted to modernise to IP, they were not interested in the risk, complexity, and business disruption that would result from ripping out the existing infrastructure and replacing it with new CAT5/6 Ethernet cabling. Need for cost-effective solution Strict company policy mandated 24/7 operational uptime, which meant there was no allowance for the disruption that the re-cabling would cause. The network needed an innovative solution to overcome its infrastructure barriers and complete its digital transformation Additionally, the enormous cost associated with infrastructure requirements was not in the budget’s scope, creating additional barriers and challenges to deploying the new IP communication solution. The sports broadcasting network needed an innovative solution to overcome its infrastructure barriers and complete its digital transformation project. PoLRE switch The customer’s IT Director met with the NVT Phybridge team at an industry event and discovered the PoLRE® (Power over Long Reach Ethernet) switch. The enterprise-grade PoLRE switch delivers fast Ethernet and PoE over single-pair UTP cable with up to 1,200ft (365m) reach; that’s four times the reach of standard Ethernet switches. The IT Director was impressed with the technology and organised a proof of concept to test the solution in a live environment. Features and benefits After a few simple setup steps, the PoLRE switch transformed the customer’s existing and proven single-pair UTP infrastructure into a robust Power over Ethernet network to support the new IP communication solution. After experiencing the features and benefits of the PoLRE switch first-hand, the customer was confident that the technology would overcome the digital transformation barriers. “The NVT Phybridge PoLRE® switch is a pretty straightforward process. The big advantage for us was delivering outstanding service, which was critical for the success of the project,” said Richard Smith, Product Sales Specialist, GSP America. Saved costs on digital transformation The customer significantly accelerated its digital transformation project by deploying the new IP solution The sports broadcasting network saved over $500,000 in infrastructure costs using the NVT Phybridge PoLRE switches. The customer significantly simplified and accelerated its digital transformation project, deploying the new IP communication solution without disrupting its regular business operations. The PoLRE switch’s extended reach capabilities simplified LAN design and ongoing network management, as the customer was able to support the new IP phones exactly where they were needed without additional IDF closets. “It’s a pretty straightforward process,” said Richard Smith, Product Sales Specialist, GSP America. “The big advantage for us was delivering outstanding service, which was critical for the success of the project”. The customer was able to avoid the traditional rip-and-replace upgrade method, using Modern LAN principles to improve the outcome of the project significantly.
RADWIN, a globally renowned provider of wireless broadband and technology solutions, has announced that Krungthep Thanakom, on behalf of the Bangkok Metropolitan Administration in Thailand, has approved RADWIN's FiberinMotion wireless mobility solution for the Bangkok Gold Line, part of Bangkok's rapid transit system. FiberinMotion mobility solution RADWIN's train-to-ground mobility solution provides critical broadband connectivity that ensures service continuity at high speeds and in challenging environments, in order to best support the Bangkok Gold Line’s real-time CCTV and PA systems. The Gold Line in Bangkok is the first, fully automated Mass Rapid Transit (MRT) system The Gold Line in Bangkok is the first, fully automated Mass Rapid Transit (MRT) system. The project work of network design, installation and systems integration for the complete communication system were provided by AMR Asia Public Company Limited (AMR Asia). Partnership with AMR Asia AMR Asia Public Company Limited (AMR Asia) specialises in communication, computing, networking, and IT solutions for railway applications. AMR Asia's communication system is used on the wayside and onboard Bombardier Transportation's (part of the Alstom Group), INNOVIA APM, an automated people mover. “We selected FiberinMotion for our train-to-ground system, based on RADWIN's expertise in deploying wireless transportation networks, as well as the company's fast and professional response,” said Marut Siriko, Managing Director at AMR Asia Public Company Limited (AMR Asia). Featuring unique synchronisation technology Marut Siriko adds, “Utilising unique synchronisation technology, FiberinMotion operates in high interference environments, to guarantee dedicated bandwidth and high throughput per train.” The first phase of the project connects Krung Thonburi to Khlong San, in Bangkok, Thailand. The Gold Line is planned to reach Prajadhipok Road and to connect with the Purple Line, during the second phase of deployment of the project.
A Sports and Recreation Centre in Mexico was relying on an outdated security system that could no longer provide the required capabilities. The organisation decided to deploy a new IP solution to provide the safest facility for healthy recreation. A center is a place where sports and culture come together to contribute to the physical, intellectual, and social development of the community. The organisation promotes honesty, diversity, and participation; ensuring everyone can contribute to creating a better world. Planning IP upgrade One of the organisation’s core values is to continuously improve service quality and member experience. However, while planning its IP upgrade, the organisation became concerned with establishing the necessary infrastructure to effectively and securely support the new IP surveillance system. The large Sports and Recreation Centre is comprised of several indoor and outdoor facilities; including soccer fields, tennis courts, swimming pools, basketball courts, gymnasiums, and multi-purpose rooms. The size and diversity of the facility left the organization concerned with: Extremely high costs to establish new infrastructure in each building – and connect the infrastructure in each building with new fiber-optic cabling Long deployment times to establish the necessary infrastructure and implement the new IP solution Disruption to members and network downtime caused by the network overhaul Change the conversation; improve the outcome Given the customer’s needs, the reseller partner, Panaseg, was confident in recommending the NVT Phybridge FLEX24 long-reach PoE switches. The customer had used NVT Phybridge products in the past with great success and was confident in the solution. Modern LAN principle #3 suggests leveraging new Power over Ethernet (PoE) innovations to simplify the modernisation to IP and improve return on investment. The customer was satisfied and excited to use the FLEX switch to leverage their existing infrastructure to simplify the deployment. FLEX24 PoE switch FLEX24 switch transformed the existing multi-pair infrastructure into a robust and reliable PoE backbone After a few simple setup steps, the award-winning FLEX24 switch transformed the customer’s existing multi-pair infrastructure into a robust and reliable PoE backbone for the new IP surveillance system. The long-reach capabilities ensured that the organisation could support the new IP cameras with up to 2,000ft (610m) reach – 6 times farther than standard PoE switches. By eliminating the rip-and-replace requirement, the Sports Center reduced project costs and disruption while eliminating risk, network complexity, and cybersecurity concerns. “I highly recommend the FLEX24 solution from NVT Phybridge”, said Octavio Villa, Sales Director at Panaseg. “NVT Phybridge helps us bring great value to our customers with long reach PoE solutions that can leverage existing infrastructure to support IP. Product quality is great, and the support team is knowledgeable and helpful”. A better return on investment The Sports and Recreation Centre took a proactive approach to find new and better ways to support their IP modernisation objectives in a financially and socially responsible manner. The customer changed the conversation around LAN design to improve their outcome; leveraging Modern LAN principles and NVT Phybridge Power over Ethernet innovations to: Deploy 250 new IP cameras across the recreation centre Reduce the overall deployment time by more than 3 months Reduce infrastructure costs by 50% Avoid installing 7,500 pounds of cable Eliminate the need to install multiple IDF closets Simplify PoE network requirements
The Toronto Transit Commission (TTC) wanted to upgrade the intercom system throughout its subway stations. However, during the planning process, the TTC discovered several obstacles that needed addressing. The agency wanted to upgrade its intercom system with IP devices but did not know how it would ensure a robust and effective local area network to support it. Given the unique characteristics of a subway station, re-cabling would be extremely expensive, disruptive, and time-consuming. Any disruption to subway operations would devastate the city’s transportation infrastructure, as city residents use TTC services to make over 1 million trips per day. Additionally, re-cabling the subway stations would take several months and far exceed the project’s budget. The TTC searched for an innovative solution to overcome its digital transformation barriers. FLEX 24-10G switch The TTC discovered NVT Phybridge and its long reach Power over Ethernet (PoE) innovations and engaged with one of their subject matter experts to learn more. After discussing the project and its challenges, NVT Phybridge recommended the FLEX24-10G switch. The agency was intrigued and organised a no-cost, no-obligation proof-of-concept to test the solution on site. After a few simple setup steps, the FLEX24-10G transformed the existing network into a robust PoE backbone to support the new IP intercom system. FLEX24-10G delivers Gigabit speeds to standard reach and 10/100Mbps symmetrical, full-duplex, and PoE++ (50W) over 4-pair UTP or PoE+ (30W) over 2-pair UTP with up to 2,000ft (610m) reach. With six times the reach of standard switches, TTC was confident that they had found the perfect solution. Digital transformation The TTC used the NVT Phybridge FLEX24-10G switch to deploy over 1,500 NetSpire IP intercom devices The TTC took a proactive approach to find new and better ways to achieve its digital transformation objectives in a financially and socially responsible manner. The agency used its existing infrastructure and the NVT Phybridge FLEX24-10G switch to deploy over 1,500 NetSpire IP intercom devices throughout 75 subway stations. “NVT Phybridge allowed us to re-use our existing cabling,” said Norbert Koot, Senior Engineer, TTC. “Re-cabling all our subway stations would have represented a tremendous scope increase, which would have drastically amplified time and budget requirements to complete the project.” Robust and secure network “The NVT Phybridge FLEX24-10G switch allowed us to create a robust and secure network backbone for our new NetSpire Passenger Intercom System,” said Jeff Thurston, Project Manager, TTC. “The new solution provides greater communication flexibility to help TTC Operations improve the response time to customer’s needs.” The Toronto Transit Commission was extremely impressed and satisfied with the solution, using the FLEX24-10G switch to achieve incredible results. Leverage existing infrastructure to drastically decrease network readiness costs. Simplify the entire digital transformation project while collapsing planning and deployment time. Eliminate business disruption during planning and deployment. Create a robust and secure IP platform that is easy to configure, manage, and troubleshoot. Per the TTCs Green Procurement Policy, the agency chose the FLEX24-10G switch to avoid more than 9 tons of cabling e-waste.
IP transmission: Manufacturers & Suppliers
- exacqVision IP transmission
- Axis Communications IP transmission
- BCDVideo IP transmission
- AMAG IP transmission
- Video Storage Solutions IP transmission
- OT Systems IP transmission
- Dahua Technology IP transmission
- Avigilon IP transmission
- Messoa IP transmission
- Hikvision IP transmission
- Dallmeier IP transmission