LifeSafety Power continues to show its leadership in the intelligent networked power category, unveiling the NetLink NLX Network Communication Module, a remote monitoring device engineered to handle enterprise applications and specifications which require large numbers of network-managed outputs. NLX Network Communication Expanding the NetLink family, NLX is the next generation of network communications from LifeSafety Power, offering eight Serial Peripheral Interface (SPI) ports instead of fo...
Antaira Technologies, globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-C800 and LNX-C800G Series. LNX-C800 and LNX-C800G series Antaira Technologies’ LNX-C800 and LNX-C800G series are 8- port industrial compact unmanaged Ethernet switches embedded with 8*10/100Tx RJ45 ports (8*10...
Razberi Technologies announced significant advances to its video surveillance platform, with a new line up of enterprise video servers. The company, Razberi Technologies provided an overview of the new products via webinars from March 18 to March 26, 2020. Interested individuals can watch webinars on-demand right now. Razberi Core data center appliances Razberi demonstrated an extensive new line up of Razberi Core data center appliances. The line-up includes a new series of high performance, c...
Intinor, global developer of products and solutions for high quality video over the internet, will attend NAB 2020 Show (Las Vegas Convention Center, date to be rearranged) to showcase its uniquely powerful solutions to both combine as many as eight individual video feeds, and stream them synchronously across multiple internet paths. A strong supporter of NDI, Intinor will be co-exhibiting with NewTek on booth SL4711. Coherent video path over internet The Intinor solution creates a coherent vi...
IP audio and control interface innovator Barix is heading to the ISC West 2020 security industry trade show with a wide range of powerful yet cost-efficient new hardware innovations and third-party integrations. The company will exhibit in booth 19140 at the event, taking place from March 17 to 20 at the Sands Expo and Conference Center in Las Vegas. SIP Audio Endpoint hardware A centerpiece of Barix’s new product demonstrations will be the North American debut of the SIP Audio Endpoint...
The original flagship FlexPower power supply line from LifeSafety Power has received a comprehensive design update with enhanced features and capabilities: FlexPower FPO Generation 2 (Gen2). LifeSafety Power, the globally renowned provider of innovative power solutions that focus on excellence in manufacturing and cost-saving installation and design, has redesigned the FlexPower line to bring additional improvements to installers and users in the access control market. FlexPower FPO Generation...
Drones are commonly known for flying in the sky, but a new breed is rolling around on the ground and swimming in the ocean. Now, in an alliance straight out of science fiction, two CT-based drone companies are joining forces to take on the task of protecting our planet using both airborne and amphibious drones by automating operations in security, environmental and even military fronts, globally. Harford based Aquiline Drones (AD), a premiere Cloud and drone solutions company, will be powering GuardBot's spherical and amphibious robotic vehicles via the AD Cloud (or ADC). Like Amazon's AWS, ADC is quickly becoming the industry Gold Standard for all Unmanned Vehicle (UV) operations, taking full advantage of its capacity, modularity and truly salient features for autonomous assignments, operations and quests. Advanced AI for complicated missions “Our new alliance with Aquiline Drones now gives us the ability to program our bots with advanced AI for complicated missions in surveillance, security and detection. And with AD’s focus on US supply chain manufacturing, this is truly pioneering a new direction for drone technology in the US,” noted Peter Muhlrad, President of GuardBot. "GuardBot was initially conceived for a planetary mission on Mars. As such, our robots can traverse all terrains, including paved roads, dirt paths, dunes, snowy fields, sloped mountains, or even water surfaces. GuardBot spherical robots can even navigate upstream,” said Muhlrad. “And with the right sensor, camera and/or acoustic package, the use cases are endless,” Muhlrad notes. “Our new collaboration with Aquiline Drones couldn’t be timelier! The first batch of GuardBots will be manufactured at AD’s downtown Hartford facility starting in May,” added Muhlrad. Interchangeable sensors Each GuardBot is equipped with pods on its right and left sides that contains interchangeable sensors GuardBot’s circular drones range from 6.5 inches to 7 feet in diameter and move using a patented drive-mechanism that allows it to easily provide forward and backward motion as well as make 360-degree turns. They can operate continuously for up to 25 hours on one charge and reach speeds of up to 12 mph on land and 3 mph in water. Each GuardBot is equipped with pods on its right and left sides that contains interchangeable sensors, such as video cameras, thermal, infrared, microphones GPS and audio for continuous content gathering, transmission of data and constant communication with command control. AI and IoT infrastructure management “In the coming months, ADC will undergo rigorous testing, hosting and management trials with GuardBot’s proprietary software application. ADC’s highly modular AI architecture is suitable for crucial customisation of solutions typically not available in the open marketplace. And, as an unmanned vehicle cloud, no other cloud platform provides the same level of robustness and salient features that enable complex mission planning scenarios, autonomous flight and ground operations powered by AI and IoT infrastructure management,” said Barry Alexander, Founder and CEO of Aquiline Drones and AD Cloud Services. “We eagerly anticipate integrating GuardBot’s entire network of all-terrain drones into our cloud to provide enterprise asset management (EAM) services, including data gathering, analytics, modeling and storage capabilities,” Alexander added. "Additionally, the timing of this hi-tech endeavor could not be more opportune - not just for Connecticut, which is quickly becoming the drone capital, but for our entire nation!" Advocates workforce development Admittedly, drone technology is exciting, ushering in a plethora of opportunity industry wide" "Admittedly, drone technology is exciting, ushering in a plethora of opportunity industry wide. AD strongly advocates workforce development and intends on using the burgeoning AD brand to further expand the industry, thus creating opportunity for all interested,” Alexander continued. "Given the abundance of use cases in our defense department and other government agencies, AD is particularly pleased with the opportunity it delivers to our veterans,” Alexander added. “Not only is GuardBot useful technology, but it is truly thrilling,” said Alexander. "Civic unions are born out of compatibility, and business is no different. Can’t think of a better way to describe the exciting collaboration between Aquiline and GuardBot,” Alexander added. “GuardBot dovetails nicely into our business model and complements our mission of pioneering a new direction in the UAV/S industry where safety comes first,” Alexander concluded. Audio/visual sensors As GuardBot’s amphibious and land-based drones can be outfitted to carry payloads, such as audio/visual sensors, fire retardant liquids and ground penetrating radar, Muhlrad and Alexander both emphasise that the collaboration of their companies will produce a variety of new and powerful capabilities for drone systems, including: Aquatic Military Missions Forest Fire Mitigation Security Monitoring (home, construction and commercial endeavors) Beach Patrol and Harbour Security School Safety Identification and Detection of Explosive Materials Ecologic and Geologic Testing (of volcanoes, mountains and other land structures to detect and warn of natural disasters) Parking Garage/Lot Surveillance Homeland Security Amphibious Surveillance Broadcasting and Multi-Venue Live Sportscasting Monitoring Hazardous Materials Spills and Environmental damage Safety Monitoring of Dangerous Weather Conditions Detection of Hazardous Chemicals Strict safety standards Further, through cloud-based transmitters, AD’s aerial hardware will be able to deploy and communicate with GuardBot’s ground-based vehicles for a seamless unmanned system that works together in solving potential life-threatening issues like fires, theft, vandalism and violent attacks. “Being pilot-owned and boasting more than 200 years of collective experience in the aviation industry, Aquiline Drones understands and adheres to the strict safety standards of the Federal Aviation Administration,” adds Alexander. “In addition, as one of only four drone airline companies in the United States holding an FAA 135 Air Carrier Certificate, we offer future operational flexibility to facilitate approvals and exemptions on non-traditional, augmented and unique UAV operations such as the GuardBot collaboration.”
Keysight Technologies has announced Breach Defense, a security operations (SecOps) platform designed to improve operational security effectiveness. An integral element of the new platform is the Threat Simulator breach and attack simulation solution which enables network and security operations teams to measure the effectiveness of operational security by safely simulating the latest attacks and exploits on live networks. Security operations teams are faced with an increasingly complex network environment that is continuously under attack by a flood of cyber threats generated inside and outside of their organisations. Test-based evidence According to a recent Keysight Security Operations Effectiveness survey: Good security tools don’t always protect as expected: 50% of survey respondents stated they found their security solution was not working as expected after a breach had occurred. Most organisations don’t verify their security is working as it should: Only 35% of respondents have test-based evidence to prove their security products are configured and working correctly. Most organisations recognise the value of security testing: 86% of respondents stated they would value a solution that finds and helps to remediate vulnerabilities in a company’s security posture. Testing security capabilities Threat Simulator uses a series of lightweight agents to simulate attacks on a live network “An organisation can be safe one day and vulnerable the next. Testing security capabilities at one point in time provides limited visibility to an organisation’s ongoing security posture,” said Paula Musich, Research Director, Security and Risk Management at market research firm Enterprise Management Associates. “At its heart, security is both a people and processes issue." "By testing defenses on a regular basis using attack simulation, security operations teams can stay on top of changes that can turn good security hygiene into an exploitable vulnerability.” Enterprise security operations Keysight’s Threat Simulator solution provides enterprise security operations teams a method for testing security tools to determine their effectiveness in protecting the organisation. It provides a continuous, automated security assessment of end-to-end production network security infrastructures, enabling organisations to quickly spot gaps and environment drift of security configurations, which is typically the result of someone in IT or a related group making a change without any malicious intent, while a patented recommendation engine provides clear remediation steps. Built on a software-as-a-service platform, Threat Simulator uses a series of lightweight agents to simulate attacks on a live network without exposing production servers or endpoints to malware or attacks. Threat Simulator features a library of threat simulations which is continuously updated by Keysight’s experienced Application and Threat Intelligence Research Center. An integrated dashboard makes it easy to conduct assessments, spot vulnerabilities and drill down on issues. Instructions to mitigate vulnerabilities Threat Simulator helps security operations teams find those gaps and gain actionable insight into how to close those gaps" It features step-by-step instructions to mitigate vulnerabilities to help security operations teams solve the issue. “Today’s network and security teams just don’t know how effective their security solutions are on a continuous basis,” said Scott Register, Vice President, Security Solutions, Keysight Network Applications & Security Group (formerly Ixia Solutions Group). "Security breaches aren’t always caused by a lack of capable products — often they are due to misconfigurations or a lack of security skills. Probing for coverage gaps has never been an easy task on a live network. Threat Simulator helps security operations teams find those gaps and gain actionable insight into how to close those gaps and improve their security posture.” Stop infected internal devices In addition to Threat Simulator, Keysight’s Breach Defense SecOps platform includes ThreatARMOR, a threat intelligence gateway. Complementing an existing security infrastructure, ThreatARMOR reduces attack surface by blocking up to 80% of malicious traffic at the source—decreasing the number of security information and event management (SIEM) alerts. ThreatARMOR can: block traffic from known bad IP addresses at line-rate speeds; block malicious IP addresses manually or automatically from SIEM tools; identify and stop infected internal devices from communicating with known botnet C&C servers; block traffic by geography; and block unused IP space / unassigned IP addresses and hijacked domains from a network.
Johnson Controls introduces the Tyco HD Encoder, an ideal solution that allows high definition (HD) and standard definition (SD) analogue cameras to function within an evolving IP infrastructure. The product is supported by both exacqVision, American Dynamics and VideoEdge. IP video surveillance Available in one-and four-channel options, the Tyco HD Encoder allows users in networked environments to retain HD and SD cameras while adding IP cameras over time, leveraging the benefits of IP while utilising their existing analogue infrastructure. Encoder hardware adapts analogue video to be sent over IP networks, helping CCTV systems upgrade to a modern IP video surveillance organisation. The HD Encoder is ready for deployment out-of-the-box and is Power over Ethernet enabled for minimal cabling by running power and data through the same CAT5/6 cable. The encoder also includes important features like HDMI out, H.264 compression for cameras up to 2MP, multi-streaming and support for AHD, CVI and TVI analogue protocols. Fully integrated video system Tyco provides network video recorders and video management systems from American Dynamics and Exacq, offering the foundation for a fully integrated video system. Purchasing each aspect of the solution from the same vendor reduces potential product lifetime issues while streamlining setup and support.
Similar to the famous saying of Georges Clemenceau (“Father Victory”) that ”War is too serious a business to be left to generals”, the security matter nowadays is too serious to be entrusted to security guards, police or any personnel alone. The complexity of situations is well beyond the capacity of human eyes and brain, making modern technologies like AI suitable to play an essential role in the field work. As is seen in the recent case of Novel Coronavirus (COVID-19) for example, thermal imaging technology is widely used in transportation hubs across China to detect possible carriers of the virus in a crowd with an accuracy of±0.3℃. AI technology will be used after to trace back their routes and locate the people they had close contact with, who will then be quarantined for at least 14 days to see if they have been infected. Artificial Intelligence in the security industry WizSense, a series of AI products and complete end-to-end solutions based on deep learningThe necessity of AI in security industry is also testified by the numbers that reflect people’s high expectation. According to a report by MarketsandMarkets, AI-powered Video Analytics Market is projected to register a CAGR of 41.76% during the period 2018-2022. To accelerate AI adoption, Dahua Technology - a video-centric smart IoT solution and service provider - is proud to release WizSense, a series of AI products and complete end-to-end solutions based on deep learning that focuses on human and vehicle, providing intelligence, simplicity and inclusivity to users. Cyber security using encryption algorithms With easy configuration and reasonable price, WizSense is competent enough to meet the needs of most ordinary users. Its benefits include: accurate prediction before an event; instant deterrence during an event; quick target search after an event; storage saving while ensuring target details, and privacy protection and defense against attacks. While offering abundant functionalities, WizSense also ensures high-level of cyber security using encryption algorithms that are certified by TÜV Rheinland and UL (Underwriters Laboratories). Users can rest assured that their privacy will be properly protected using WizSense series products. WizSense provides users with comprehensive protection as well as personal options to satisfy more diversified needs.
Attracting trade visitors from across the subcontinent, the region’s most influential trade fair for the security industry, Secutech India, is scheduled to return for its 9th edition from 7 – 9 May 2020 at the Bombay Exhibition Centre, Mumbai. With exhibitor registration still open, the fair has already attracted more than 350 of the world’s leading security brands with less than three months remaining before it commences. The 2020 exhibition will feature Axis Communication, CP Plus, Hikvision, ZKTeco, Infinova, Matrix, Toshiba and many more. Security devices and turnkey solutions The 2020 edition of Secutech India is set to reflect the country’s digital transformation Detailing the business value of the fair, Ms Regina Tsai, the General Manager of Messe Frankfurt New Era Business Media Ltd said: “Catering to local market requirements such as cost efficiency and a need for fast project implementation, Secutech India assembles the full range of security devices and turnkey solutions under a single roof. Benefiting from its position in Mumbai, India’s commercial centre, last year the fair attracted more than 20,000 buyers travelling from across India’s main regions, and we are looking forward to welcoming even more business this coming May.” The 2020 edition of Secutech India is set to reflect the country’s digital transformation. IP cameras are in high demand from SMEs, retail and the residential segment, while biometric access control systems are also gaining popularity in offices and at border controls, with users gradually favouring contactless systems such as facial recognition above fingerprint biometrics. Core security solutions In the view of Ms Tsai, this year’s fair is taking place at a favourable time for the regional industry: “The government aims to transform India into an electronics export hub, which will open up new opportunities for component manufacturers catering to the local manufacturing sector. But just as importantly, as part of India’s proposed Union Budget 2020, infrastructure development across roads, railway, airports, ports, and economic corridors are expected to raise demand for core security solutions including video surveillance, video analytics, biometrics and intruder detection systems." "The governments ‘Digital India’, ‘Smart City Mission’, and ‘Technology Empowerment’ initiatives will also be growth drivers.” Access control in healthcare facilities As a maturing security market, the appetite for knowledge in India is growing" Among many benefits, the ability to make onsite comparisons, conduct meaningful business discussions and view product demonstrations are a few of the show elements that visitor’s to Secutech India value. According to Ms Tsai, business effectiveness is the top priority for the fair’s organisers: “Initiatives such as the ‘Secutech connect’ business matching service which links buyers with exhibitors based on industry background continue to be highly popular, helping us to generate genuine business outcomes for participants.” But beyond business, information exchange is also a priority says Ms Tsai: “As a maturing security market, the appetite for knowledge in India is growing. This is a need that the upcoming edition of Secutech India will cater for with a series of conferences dealing with topics relevant to the local market, including cyber security, smart city digital infrastructure; the convergence of 5G, artificial intelligence, data analytics and the IoT; access control in healthcare facilities, and fire safety in elderly care homes and restaurants.” Personal protection equipment In addition to its core focus on security, Secutech India 2020, in cooperation with the GPS Association of India, will feature a pavilion dedicated to fleet management, vehicle tracking as well as passenger and driver safety. The concurrent ‘Fire and Safety India’ event will also return as the destination for trade buyers to locate the latest firefighting gear, personal protection equipment and smoke detection systems.
OPTEX and Fiber SenSys Inc., both OPTEX Group companies, have hailed the success of Intersec Dubai, especially noting the positive reaction to their point locating sensor solutions for high-end applications and the latest range of IP connected beam towers. The new Terrain Defender TD100, buried sensor from Fiber SenSys, shown for the first time at the Intersec, proved extremely popular with visitors. It is the only software-defined radio-based covert solution of its kind and adds another level of precision and accuracy for perimeter protection. It is designed specifically to answer the needs of the most demanding sites, including military, nuclear facilities, and VIP residences. It can be easily installed in a variety of terrain such as sand, grass, asphalt, concrete, etc. and can locate the point of intrusion within a metre. Ideal intrusion detection solutions The IP beams have already been successfully deployed in many sites and residences across the Middle East For locating and tracking intruders within open areas or along a perimeter, OPTEX presented Redscan LiDAR technology with exact X&Y coordinates. The detection range can be set from a few centimetres to 100m, and the target object size can be tailored to specific applications. The sensor’s flexibility and precision lend themselves to a huge range of custom applications, including detecting hands approaching an object, individuals crawling, or objects thrown over walls or fences. “The level of precision and analytics offered by our buried, fibre optic and laser sensors make them ideal intrusion detection solutions for critical infrastructure or high-security sites,” says Bassem Jouni, Middle East General Manager for the joint Optex-Fiber SenSys office. Cost-effective virtual perimeter protection OPTEX also showcased its latest line of pre-assembled IP connected beam towers, providing reliable and cost-effective virtual perimeter protection. These beams have already been successfully deployed in many sites and residences across the Middle East. “Our products have been proven across the Middle East,” Bassem continues. “Intersec Dubai provided us a great platform to engage with this market, as well as the opportunity to visit with many international clients and potential clients. It was a busy show with high-quality attendees. We appreciate the great response to our solutions that meet the needs of this important market.”
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types of access control authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organisations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasise, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organisations want to use smart phones in their upcoming access control implementations. Smart phone access control is secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices.All that should be needed to activate newer systems is simply the phone number of the smart phone Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone. Bluetooth and NFC the safer options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defence of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging systems could cause problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organisations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organisations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced security and automation features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimisation of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret of the consumer radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilising frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-on-chip solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilisation of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional smart home services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilising existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimisation of maintenance and installation costs.
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analogue to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labour are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergised and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission critical video surveillance solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralised storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralised data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate access to video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance of video in risk mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying the right video server equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyse the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analysing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analysing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analysing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video transmission and privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs. For example, while some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximise accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR for physical security professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organisation, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organisation.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specialises in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting video surveillance systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
The Supreme Court is the highest and final court of appeal for all United Kingdom civil cases, and criminal cases from England, Wales and Northern Ireland. Formed in October 2009, it replaced the Appellate Committee of the House of Lords as the highest court in the UK. At the time of writing, it has heard over 835 appeals and hears cases of the greatest public or constitutional importance. The building is located on Parliament Square, just opposite Big Ben and the Houses of Parliament. The judges of the Supreme Court, known as Justices, have the final say on the biggest legal issues. For example, the Court recently heard the high-profile Brexit prorogation-related judicial review case of R (Miller) v The Prime Minister which sought to investigate the legality of the prorogation of parliament in Summer 2019. Live streaming and media coverage Westminster location were each equipped with four Panasonic HN130s, a RP150 camera controller "As the highest court in the land, any decision here is binding and final," explains Brian Shek, Senior System Administrator & Commercial Officer at the Supreme Court. The policy of the court is to record and broadcast hearings, in keeping with their commitment to transparency. Since its creation, all cases have been archived on their website ensuring fair and open access to all. "The reason we added live streaming and media coverage is because the justices wanted the court to be fully accessible to all members of the public," adds Brian. Shots of high production value Three court rooms at the Westminster location were each equipped with four Panasonic HN130s, a RP150 camera controller and NewTek Tricaster to efficiently record the high-profile cases. “We need PTZs because it’s not practical in a court room to have an operator manually controlling the cameras,” explains Dan Money, a technical architect and IT Manager at the Supreme Court. “You need a constant shot of the Justices bench, a back and front shot, and both a wide and close up shot to gain an understanding of what is going on in the court. PTZs are the least intrusive option that guarantees transparency in the courtroom but they also give the camera operator the right level of control and ensure shots of high production value,” highlights Dan. Panasonic PTZ camera The Supreme Court installed PTZ cameras as part of their initial set up in 2009 but were in need of an upgrade that could enable them to achieve better quality recordings. “Our first requirement was updating the camera output from SD to HD,” explains Dan. “The IT team wanted to implement a system that could do everything the original system could, but make the overall image quality look better with an intuitive system that we could understand.” For the upgrade, the IT team at the court required NDI-based PTZ camera technology. They wanted to use their own technical networking expertise to maintain the system themselves. The team were able to take the NDI IP connection from the Panasonic PTZ camera and convert it to fiber using existing runs in the building. From there, the stream was converted back to IP and into a NewTek Tricaster. Professional video output Being IP-based has made camera technology far more straightforward for individuals" “We are also planning to have the audio from all court rooms also over NDI in the future so that we can have networked video and audio over the existing building infrastructure. Being IP-based has made camera technology far more straightforward for individuals like ourselves to get to grips with providing a professional video output,” explains Dan. The communications team also wanted a HD output to enable the hosting of any events. The Supreme Courts broadcast contractor were engaged to support the Supreme Court with their broadcast operation needs and provide audio/visual engineers to operate the equipment. The first big test of the system was the high-profile Brexit prorogation-related judicial review. The case of R (Miller) v The Prime Minister investigated the decision to prorogue parliament in September 2019. 1080p network-based stream “We had originally planned to sign off the system during the recess period over the summer months – however, the case was scheduled two weeks before the system was scheduled to be implemented meaning that we had to push the project forward and deliver early to stream this case,” explains Dan. To deliver the streaming services, the team used Microsoft’s Azure Media Services platform. “This is what prompted us to implement the NDI architecture in the first place as the NewTek Tricaster is on their recommended equipment list. We had to work with the lead developer of Azure Media Services to tailor the platform to our requirements to run a 1080p network-based stream on the platform," says Dan. Two access points The R (Miller) v The Prime Minister case attracted widespread media interest and news agencies including both the BBC and Sky used the court’s live stream as part of their reporting. Two access points were installed at both the front and rear of the Supreme Court to take the camera streams accessed in the control room back to the broadcasters via an OB truck. PTZ cameras provided the correct combination of cost-efficiency, quality and service “This meant that if anything was to happen to the live stream on Azure, we had the redundancy in place so broadcasters would still be able to output video from the court room themselves,” explains Dan. This proved to be beneficial as the stream did get momentarily overloaded with an audience of four and a half million at its peak and ten million for the day. Cost-efficiency, quality and service Panasonic PTZ cameras provided the correct combination of cost-efficiency, quality and service that tended to the court’s needs. “From a feature perspective, we needed a system that was cost-effective in terms of an initial outlay but also to maintain and receive support as and when we need it. We wanted a long-term relationship, and with Panasonic we know that we’d get that. "We were very pleased with the feedback we have received on the picture quality, not only from those around the courts but also from feedback on the stream and the broadcasters too!" concludes Dan.
Brienon-sur-Armançon is a city in the Burgundy-Franche-Comté region of north-central France, with a population of about 3,300. Located at the intersection of two rivers – Créanton and 'Armançon, Brienon-sur-Armançon enjoys an advanced road network which is vulnerable to illegal activities. To make the city safer, the local government, with far less than sufficient police force at hand, chose to secure its city and residents with Dahua Safe City Solution. There were two main pressing issues that needed to be addressed. Firstly, the city had far less than insufficient police force, only one policeman was supposed to look after the whole 3,300 dwellers. Secondly, Brienon-sur-Armançon had not prepared itself with necessary cables needed for modern surveillance systems, requiring the Dahua Team to design a tailored solution according to the unique local environment and limited human resources of this city. Wireless transmission device This solution aids them in obtaining video recordings that can be used as evidence in case of an incident To make up for the shortage of police force and network cables, Dahua Technology delivered a customised solution covering the whole city with various kinds of video surveillance devices. These equipment are linked by a wireless device combining PTZ camera and antenna that transmits all the collected information to the highest point in the city center. These data are then transmitted to the control center, making it easy for the police to achieve round-the-clock monitoring. To monitor major sections of the city, an array of modern devices were utilised including Starlight IR PTZ AI Network Camera, Multi-Sensor Panoramic Camera, Eyeball Camera, Thermal Camera, ANPR Camera, Wireless transmission device, keyboard, etc. From the control center in the police station, the police can check real-time situation and decide whether to take action. This solution also aids them in obtaining video recordings that can be used as evidence in case of an incident. Vehicles trigger detection In addition, the combined strength of the Dahua general camera and PTZ camera created a smart capture mechanism for the police. General cameras were installed to monitor fixed scenes, once human or vehicles trigger detection rules set by the operator (like tripwire and intrusion), the PTZ camera will automatically zoom-in and start tracking. For low-light applications, the Dahua Starlight Technology of the PTZ camera also offers outstanding light sensitivity, capturing color details even under ultra-low light condition. Moreover, ANPR Cameras were deployed for road safety enforcement on main roads. Embedded with License Plate Recognition (LPR) algorithm, the cameras have the ability to detect and recognise moving vehicle's plate number within low speed. Furthermore, installing Thermal Cameras took care of the job of monitoring the BBQ sites in the park with their built-in fire detection functionality that can detect fires even at long range distance. Effectively monitor major areas The police has solved a cemetery theft case with evidence recorded by the Dahua PTZ cameraWireless transmission device made it possible for all cameras in all locations to connect to the control center without the cost and trouble of wiring. NKB 5000 HD Network Control Keyboard was installed in the control center to help the police achieve split screen operation of both general and PTZ cameras. Some Seagate hard disks were also used to store recorded videos for future use. The Brienon-sur-Armançon police can now sit remotely in the control room and operate in an efficient way with the help of Dahua Safe City Solution, which allows them to effectively monitor major areas in the city and respond in time when an incident takes place. Dahua PTZ camera The recorded videos also serve as crucial evidence and help the police to crack a case with much less effort. In the first week of the test run of this smart system, the police has already solved a cemetery theft case with evidence recorded by the Dahua PTZ camera. “The origin of our cooperation with Dahua dates back to the visit to China a year ago. This visit to the Dahua headquarters in Hangzhou concluded with a reciprocal commitment – to equip the city of Brienon with video surveillance. We welcomed this agreement, which allowed the installation of the system and improved the daily life of our residents.” said Mr. Jean-Claude M.CARRA, Mayor of Brienon-sur-Armançon.
The sensor solutions provider HENSOLDT will equip the Royal Thai Police with its Single Mast Solution (SMS) consisting of the Spexer 360 radar integrated with an electro-optics system and the CxEye Software. After passing acceptance trials without issue, the SMS was delivered. SPEXER 360 X-band radar “Our Single Mast Solution is an extremely reliable radar, particularly suited for situational awareness”, said Nathan Manzi, Head of Asia Pacific for HENSOLDT. “CxEye assists the users, in real time, to easily and quickly evaluate and coordinate a response to threats.” SPEXER 360 is a lightweight, low power, X-band radar, designed to be deployed on a variety of platforms. SPEXER 360 can be easily integrated with additional sensors through a highly flexible C2 system. Designed for both military and civil applications SPEXER 360 offers a highly capable and affordable surveillance capability. HENSOLDT’s CxEye, command, control and display software, provides powerful integration for sensors, such as radars and cameras, within a single, simple, easy to use display package.
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan cooperation, it has contributed to a large number of job opportunities and high output value for local economic development. High-end monitoring system The expansion of the production scale of the park brought inconvenience to management and the current simple front-end camera plus back-end storage video surveillance system cannot meet the growing production management and modern monitoring needs any more. Dahua provided the park with a complete, high-end monitoring system that contain over 500 HD cameras, 100 IP camerasDahua provided the park with a customised complete, high-end monitoring system that contain over 500 HD cameras, 100 IP cameras, central management, central storage, third-party contact as well as display and control system all around factory, fence, outdoor and indoor areas to protect the whole park. To better secure the access between the network of video surveillance system, the data is gathered from front-end devices by PON transmission to establish looped network for video surveillance and to ensure reliability. Advanced technology solutions This project is the first general contracted project with great significance in Uzbekistan. Dahua is not only the supplier of the equipment, but also responsible for the whole project life cycle including construction, delivery, system documentation, technical support, operation training and long-term maintenance. The solutions have effectively reduced the difficulty during production process, which greatly improved the management efficiency for customers. In the future, Dahua will continue to provide more advanced technology solutions such as face recognition, personnel and vehicle management IT systems, industrial machine vision, etc. for the Peng Sheng industrial Park.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission critical communication over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritised over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced communication solutions in Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritised delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones in MCC over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value and Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals