Panasonic’s latest i-PRO Extreme PTZ Infra-Red security cameras set a new benchmark in night-time visual quality and intelligent functionality, packaged in a device designed for reliability and low-level maintenance to deliver lower total cost of ownership. There are two models in the IR PTZ camera range: the WV-X6533LN model with a powerful 40x zoom and the WV-S6532LN with 22x zoom. Night-time visibility ...
CyberLink Corp., a pioneer of AI and facial recognition technologies, announced a strategic partnership with VIVOTEK, the global IP surveillance solution provider, adding CyberLink’s FaceMe AI facial recognition engine to VIVOTEK’s IP surveillance solutions. The new collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, January 19-21, 2020. CyberLink’s FaceMe AI Facial Recognition Engine will be integrated into VIVOTEK’s network came...
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Mat...
VIVOTEK, globally renowned IP surveillance solution provider, and CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, has announced they have entered into a strategic partnership, which will integrate CyberLink’s FaceMe AI facial recognition engine into VIVOTEK’s IP surveillance solutions. The initial collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, United Arab Emirates. VIVOTEK – CyberLink IP partne...
Money may not buy happiness or peace of mind, but it can buy today’s high-tech home security systems that seem to deliver both to customers, according to the J.D. Power 2019 Home Security Satisfaction Study, which was released recently. The study expanded to include not only the professionally installed (Pro Install) home security systems but also do-it-yourself (DIY Install) systems. Rise of DIY home security systems The growth of the DIY home security market has fueled customer satisf...
Discreetly place emergency calls at the touch of a button with reliable emergency communication provided at fingertips of users with the PB-3-IP Panic Button from Viking Electronics. “This is what people have been asking for – it’s quick, it’s discrete, it’s reliable. People know they can trust the PB-3-IP when it counts.” said Greg Yocom, Engineering Manager, Viking Electronics. PB-3-IP Panic Button The PB-3-IP is designed for VoIP SIP systems and is PoE p...
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organisations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges. The aim is to bring together the industry to move forward together with one united, global approach to: Create harmony across security and safety solutions focused on common Operating Systems and Application Programming Interfaces (API); Drive the creation of one digital marketplace regardless of brand; Define hardware and software measures to increase the levels of data security and privacy protection across brands; Define specifications to ensure the right levels of performance OSSA Technology Stack specification In the first full year of existence, OSSA member companies by creating the first common Technology Stack specification In the first full year of existence, OSSA member companies achieved a major component of the organisation’s vision by creating the first common Technology Stack specification including a vendor-agnostic Operating System (OS) hardened for the security and safety market. This first big step allows for installation and execution of third-party apps on video security devices. It enables app developers to develop one single software application that is suitable for all cameras leveraging OSSA’s Technology Stack, independent of brand. The next steps in early 2020 are firstly for the OSSA-driven digital marketplace to go live and secondly for camera manufacturers to introduce their first commercial versions of products leveraging OSSA’s Technology Stack. The marketplace will give integrators and users the ability to easily add customised functionality to their cameras and security systems by way of installing apps (already developed by the early adopters and available at the launch of the marketplace) on video security cameras. It’s expected additional app developers will soon contribute solutions downloadable across devices and brands. INTERSEC Dubai 2020 From INTERSEC, some OSSA member companies will showcase prototype cameras based on OSSA’s commonly defined Technology Stack. Visitors can learn more about the vision of OSSA, its progress and how involved companies are revolutionising the market, by visiting the Hanwha Techwin booth and enquiring with one of the OSSA representatives.
Sophos, a globally renowned provider of next-generation cyber security solutions, has announced introducing Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defence for Android and iOS devices. Fleeceware applications Sophos has also published research, Fleeceware Apps Persist on the Play Store, which details new findings on Fleeceware applications that overcharge unsuspecting consumers for functionality widely available in other free or low-cost apps. First discovered by SophosLabs on Google Play in September 2019, Fleeceware remains a problem with more than twenty newly discovered applications with nearly 600 million alleged installations, as reported by Google. Fleeceware and other unscrupulous app developers are walking a fine line to avoid breaking hard and fast app store rules" “Fleeceware and other unscrupulous app developers are walking a fine line to avoid breaking hard and fast app store rules. This sneaky behaviour is unethical, but not illegal,” said Dan Schiappa, chief product officer at Sophos. Intercept X for Mobile Dan adds, “Possibly more worrisome are the stealthy cybercriminals who increasingly target mobile devices to carry out attacks for financial gain or as an ‘easy in’ to connected corporate networks. No mobile device is immune, and attackers are counting on unprotected devices and unpatched flaws to carry out their attacks. Intercept X for Mobile protects users from risky applications and malicious content, and keeps business data on mobile devices secure.” Leveraging the same deep learning anti-malware technology used in Intercept X for Windows, macOS and server, Intercept X for Mobile protects users, their devices and their data from known and never before seen mobile threats. A completely redesigned interface simplifies security management and aids accessibility for users with disabilities, by providing: Device Security: Intercept X for Mobile continuously monitors for and alerts users and IT administrators to signs of potential compromise so they can rapidly and automatically remediate issues and revoke access to corporate resources. Compliance checks detect jail-breaking, rooting, operating system versions, and more, informing users and IT administrators of violations and taking automatic action. Network Security: Intercept X for Mobile monitors network connections for suspicious activity in real time, warning users and IT administrators of potential Man-in-the-Middle (MitM) attacks. Web filtering and URL checking also stop access to known bad sites, protecting users from unsuitable content, and SMS phishing detection ¬spots malicious URLs. Application Security: Intercept X for Mobile detects malicious and suspicious applications installed on devices, protecting against malware, ransomware and potentially unwanted apps like Fleeceware. Integration with Unified Endpoint Management (UEM) solutions like Sophos Mobile and Microsoft Intune enable administrators to build conditional access policies, restricting access to applications, data and corporate resources when threats are detected. Chromebook Security: The new Chromebook Security extension protects Chrome OS users from unsuitable and malicious web content, provides app white and block-listing, and lets IT administrators report on device status and configuration. Securing personal and professional devices Intercept X for Mobile provides enhanced protection to secure personal and company devices" “There’s a false sense of understanding that organisations don’t have the right to secure employee-owned devices, but that couldn’t be farther from the truth. No device is off limits to an attacker, and left unsecured, mobile devices introduce significant risk,” said Scott Larson, owner of Technology By Design. “Intercept X for Mobile provides the best-in-class protection needed to secure personal and company-issued devices in today’s rapidly evolving threat landscape. It’s a must-have, non-intrusive solution that strengthens any organisation’s defences, and it enables leading service providers like Technology By Design to protect customers from the most sophisticated and advanced threats.” Synchronised Security approach Intercept X for Mobile is easily managed in the cloud-based Sophos Central platform alongside Sophos’ entire portfolio of next-generation cyber security solutions. Sophos’ unique Synchronised Security approach empowers these solutions to work together for real-time information sharing and threat response. “Intercept X for Mobile is the best way to consolidate multiple endpoint management platforms for consistent policies, comprehensive security and letting users be productive on the devices they prefer,” said Phil Hochmuth, IDC program vice president. “It delivers best in class protection and performance, with less time and effort spent on managing and securing traditional and mobile endpoints.” Security and device management A globally renowned leader in the IDC MarketScape: Worldwide Enterprise Mobility Management Software for Small and Medium-Sized Businesses 2019–2020 Vendor Assessment report, Sophos provides “a centralised source for purchasing and support as well as unifying all aspects of security and device management, including endpoint antivirus on PCs to EMM/UEM and MTM security on smartphones,” according to the report. “Sophos has the ability to synchronise web security polices and protection settings across a worker's entire device environment, from mobiles (iOS/Android) to PCs (Windows, Mac and Chrome OS), allowing polices to follow users in browsers across all platform types.” Cyber and data security experts Sophos is an internationally renowned provider of cyber security and data security solutions Sophos is an internationally renowned provider of cyber security and data security solutions. The company's cloud-native and AI-enhanced security solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cyber-criminal tactics and techniques. Technology By Design, LLC is a global provider of network solutions, technical support and services, cloud security and data solutions, surveillance cameras installation, cyber security and data security solutions. Sophos Mobile 9.5 UEM feature Sophos Intercept X for Mobile is available now as a stand-alone license or bundled with the new Sophos Mobile 9.5 UEM for additional endpoint management capabilities, providing a complete and secure UEM platform with an integrated mobile threat defense solution.
CNL Software, globally renowned developer of Physical Security Information Management (PSIM) software solution, is pleased to announce that it will be exhibiting at Intersec 2020. CNL will focus on the technology that is driving the digital transformation of control rooms across the Middle East region. CNL will be joined by Cepton Technologies, Inc. a developer of industry-leading 3D sensing solutions, who will be showcasing their latest correlation of LiDAR data with real time video visualisation. Scalable and secure PSIM solutions CNL Software will share valuable insights into its open, adaptable, scalable and secure PSIM solutions CNL Software will share valuable insights into its open, adaptable, scalable and secure PSIM solutions as chosen by regional governments, military, enterprises and cities. It will discuss how security operations can leverage the latest technology developments such as Artificial Intelligence (AI) and Machine Learning (ML) to help to identify and respond to incidents faster and more accurately. “CNL IPSecurityCenter is trusted by the best-informed security operations in the Middle East to provide proactive control from a central command center and supports autonomous local operations”, said Craig Menzies, General Manager – Middle East for CNL Software. “The region is changing, we are seeing the digitalisation of control rooms as organisations evolve to meet today’s security challenges. CNL is driving this within our customers, enabling them to leverage from the best of breed technologies.” Integration with IPSecurityCenter When integrated with IPSecurityCenter, Cepton further enhances the industry’s most comprehensive PSIM system solution, providing users with access to more of the tools they need to quickly see, understand, assess and properly resolve perimeter security and surveillance incidents, consistently. “For the first time in the Middle East, Cepton will be showcasing the correlation of LiDAR data with real time video visualisation. From a technical perspective the camera will be calibrated into a common coordinate system with the LiDAR. As a result, it will provide 3D world coordinates from the LiDAR onto a 2D video stream,” said Neil Huntingdon, VP Business Development at Cepton. LiDAR network detection Neil further adds, ”This ground breaking system provides instant video confirmation of targets detected by the LiDAR network, which will reduce false positives and allow threats to be identified faster. We have also created targeted zones for critical areas, where we can use superior algorithms without the need for additional computing hardware. This functionality also allows us target sections of video, which can be stored in high-resolution while the rest is stored in lower resolutions leading to increased efficiency and reducing the need for expensive processing and storage.”
ONVIF, the renowned global standardisation initiative for IP-based physical security products, hosted its 21st Developers’ Plugfest late last year in Rome, an event that highlighted the continued demand for interoperable solutions. More than 30 developers and engineers from 18 ONVIF member companies gathered for this multi-day event, which featured 164 hours of testing. Attendees tested their implementations of ONVIF profiles along with other ONVIF profile-conformant products. Developers could also test products independently for profile conformance, as well as assess interoperability between their devices and those from other manufacturers Profile T for advanced video streaming The collaboration and exchange of ideas necessary for interoperability does not happen in a vacuum" “The collaboration and exchange of ideas necessary for interoperability does not happen in a vacuum and as such, these events provide valuable face to face time for our members,” said Per Björkdahl, chair of the ONVIF Steering Committee. “We are grateful for the continued support from our member companies and developers to help us continue to maintain profiles.” Profiles tested at this event included Profile S for basic video streaming, Profile T for advanced video streaming, Profile G for edge storage and retrieval and Profile Q for quick installation. Additionally, developers were able to perform testing of the Media2 service methods for media configuration and streaming and conformance testing for discovery. ONVIF Developers’ Plugfests ONVIF Developers’ Plugfests are held twice a year around the world, allowing the global membership of ONVIF to gather and test their implementations. The next ONVIF Developers’ Plugfest is scheduled for May 13 – 15, 2020. The location will be announced at a later date. Founded in 2008, ONVIF is a leading and well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and more than 13,000 profile conformant products. Profile S for streaming video ONVIF offers Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality; Profile A for broader access control configuration and Profile T for advanced streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.
Pulse Secure, the provider of software-defined Secure Access solutions, announces a new distribution partnership with SecureWave, a data security and IT infrastructure value added distributor, to grow its sales channel across the Israel to meet accelerating demand for Zero Trust access security. SecureWave, part of the Exclusive Networks Group is present in more than 30 countries around the world, and maintains an active community of more than 350 partners. The company will offer the integrated portfolio of Pulse Secure solutions, including virtual private network (VPN), software defined perimeter (SDP), network access control (NAC), and virtual application delivery controllers (ADC). Sales and technical enablement SecureWave will support Pulse Secure partners with sales and technical enablement The agreement will include Pulse Secure’s Zero Trust-based Access Suite which delivers protected connectivity, operational intelligence and threat response across mobile, network and cloud environments. “Pulse Secure has been a driving force behind the adoption of Zero Trust Secure Access and we look forward to helping our channel partners to benefit from its visionary position through our expertise, knowledge and experience within this market,” says Moran Gerassi, CEO for SecureWave. As part of the new distribution agreement, SecureWave will support Pulse Secure partners with sales and technical enablement, lead generation and a full educational programme. Global distributor network “SecureWave is a highly respected distributor that is well suited to help us expand and support our partner community to match our growing solution portfolio,” said Laurent Delattre, Sales South EMEA for Pulse Secure, “The addition of SecureWave to our global distributor network is a recognition that the move to Zero Trust is prompting significant change in the security landscape and provides a major and untapped opportunity for the channel to capitalise upon.” The Zero Trust security market size is projected to grow from USD 15.6 billion in 2019 to USD 38.6 billion by 2024, at a CAGR of 19.9% from 2019 to 2024 according to MarketsandMarkets Research. Pulse Secure’s Zero Trust focus is delivered with the Pulse Access Suites. Virtual application delivery controller This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability The Suites provide remote, mobile, cloud, network and application security with comprehensive VPN, mobile device management (MDM), single sign-on (SSO), endpoint and IOT device security, network access control (NAC) and virtual application delivery controller (ADC) functionality. Pulse SDP is a Suite add-on which activates software defined perimeter (SDP) components within existing Pulse solutions to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability, deployment flexibility, automated provisioning and resource optimisation. In November, Pulse Secure won the Software Defined Vendor of the Year at CRN Channel Awards 2019 recognising its development of new software defined technologies to help the channel meet growing demand for Zero Trust security.
Ambarella, Inc., an artificial intelligence (AI) vision silicon company, announced that Ambarella and Amazon Web Services, Inc. (AWS) customers can now use Amazon SageMaker Neo to train machine learning (ML) models once and run them on any device equipped with an Ambarella CVflow-powered AI vision system on chip (SoC). Until now, developers had to manually optimise ML models for devices based on Ambarella AI vision SoCs. This step could add considerable delays and errors to the application development process. Ambarella and AWS collaborated to simplify the process by integrating the Ambarella toolchain with the Amazon SageMaker Neo cloud service. Now, developers can simply bring their trained models to Amazon SageMaker Neo and automatically optimise the model for Ambarella CVflow-powered SoCs. Neural network accelerator Customers can download the compiled model and deploy it to their fleet of Ambarella-equipped devices Customers can build an ML model using MXNet, TensorFlow, PyTorch, or XGBoost and train the model using Amazon SageMaker in the cloud or on their local machine. Then, they can upload the model to their AWS account and use Amazon SageMaker Neo to optimise the model for Ambarella SoCs. They can choose CV25, CV22, or CV2 as the compilation target. Amazon SageMaker Neo compiles the trained model into an executable that is optimised for Ambarella’s CVflow neural network accelerator. The compiler applies a series of optimisation that can make the model run up to 2x faster on the Ambarella SoC. Customers can download the compiled model and deploy it to their fleet of Ambarella-equipped devices. Enterprise video security The optimised model runs in the Amazon SageMaker Neo runtime purpose-built for Ambarella SoCs and available for the Ambarella SDK.The Amazon SageMaker Neo runtime occupies less than 10x the disk and memory footprint of TensorFlow, MXNet, or PyTorch, making it much more efficient to deploy ML models on connected cameras. “Ambarella is in mass production today with CVflow AI vision processors for the home monitoring, enterprise video security, and automotive markets,” said Chris Day, vice president of marketing and business development for Ambarella. "The ability to select an Ambarella SoC and compile a trained ML model with a single click is a powerful tool that makes it possible for our customers to rapidly bring the next generation of AI-enabled products to market.” Advanced security features AWS has the deepest set of ML and AI services focused on solving some of the toughest challenges facing developers" Manufactured using an advanced 10-nanometer process, Ambarella’s CVflow SoC family enables the design of compact, high-performance vision systems with ultra-low power operation. For example, the Ambarella CV22 CVflow SoC delivers computer vision processing at full 4K or 8-megapixel resolution at 30 frames per second (fps), while its image signal processor (ISP) provides outstanding imaging in low- light conditions and high-contrast scenes, further enhancing the computer vision capabilities of the chip. The CV22 also includes a suite of advanced security features to protect against hacking including secure boot, TrustZone, I/O virtualisation, and support for online upgrades over the air (OTA). Machine learning models “AWS has the broadest and deepest set of ML and AI services focused on solving some of the toughest challenges facing developers. Amazon SageMaker is a fully managed service that provides every developer and data scientist with the ability to build, train, and deploy machine learning models quickly,” said Bratin Saha, Vice President, Machine Learning & Engines, Amazon Web Services, Inc. “We’re excited that VIVOTEK is using SageMaker Neo to simplify the deployment of ML models at the edge on Ambarella CVflow-powered IP cameras.”
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customisable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customise devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarised, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analysing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyse massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyse massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognise residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorised person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning “We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customisation during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a mobile credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cyber security, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasising “cyber security by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cyber secure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualised and integrated in the Dahua DSS platform for centralised management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronise the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognise moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognised. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing colour details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Haier Group, China’s home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realise multiple tasks within the whole industrial park. First, to prevent theft and timely detect people climbing over the perimeter fence. Second, to provide comprehensive monitoring in the whole industrial park and inside the factory which includes: monitoring of production line and employees’ smoking behaviour during working hours at office areas; efficient employee attendance; vehicle identification at the entrance and exit areas of the industrial park; and the overall management of all devices, data report output, etc. Intrusion detection The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the system also supports further device upgrade based on customer’s future plan for the next several years. AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. The combination of advanced AI analytics and real-time alerts to a desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. Smart IR technology The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. These cameras are equipped with smooth control, high quality image and good protection As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Face recognition Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR Cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognise the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle colour detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices At the management centre, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Up-to-date Dahua AI equipment Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost. Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation,” said Zhao Shengbo, Regional Director of Dahua CIS. “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorised the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfil the aforementioned requirements, the Ministry of Security of Buenos Aires authorised the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behaviour. As part of the requirement, the management terminal was installed at the centre of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilised social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance centre is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
Once an underused industrial wasteland, King’s Cross is one of the largest and most exciting redevelopments in London. The 67-acre site is being transformed into a new part of the city with homes, shops, offices, galleries, bars, restaurants, schools, and a university. The King’s Cross development is a mixture of old and new buildings and many of the old buildings are listed with strict planning restrictions. “Some of the buildings here have played a significant part in the area’s history, so extra care needs to be taken when installing a security system,” says Nick Killington, King’s Cross Estates security system design specialist. Security solution The Gallagher solution provides flexibility to integrate a number of other systems The public areas and many of the buildings in the estate are managed and maintained by the King’s Cross Estate Services team. They are tasked with keeping the site well-maintained, well-lit and secure at all hours of the day and night, making it a place all people want to visit and enjoy. To help make King’s Cross the best managed estate in the UK, the team needed a security solution that could evolve alongside them as the estate grows. Nick Killington says Gallagher was the specified solution throughout the project. “As we are such a large estate, we required an enterprise solution that offers us the ability to extend as and when required, something we know is a particular strength of the Gallagher system.” Visitor management “The Gallagher solution is particularly useful in a retro-fit situation like this, where running cables and network points in such buildings isn’t allowed. For example, we eventually want to replace some of the door handles with a wireless locking system, which we know can also be linked to the Gallagher system.” The Gallagher solution provides flexibility to integrate a number of other systems, such as video, visitor management and elevators, as well as being able to add functionality like mobile access when they require it. Gallagher technology will continue to feature across the new phases of the King’s Cross development, providing integrated, scalable security solutions to help create a welcoming, secure place for people to work, live and do business in this whole new part of London. “The Gallagher solution has allowed us to future proof our security, ensuring it will evolve with our needs as and when required.”
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, has announced that Ocean Blue Car Wash, Prescott Valley, AZ, has deployed or is upgrading to 3xLOGIC 32 4MP-camera video surveillance systems at four of its locations to date. DC Pro Systems is the integrator of record as it continues to install and maintain a growing number of Ocean Blue locations. V7000 NVRs and V-Series 4MP dome cameras We are standardising on the same robust 3xLOGIC video surveillance system at each of our locations" As one of the state’s first Express Car Wash concepts, the owners of Ocean Blue Car Wash have put to use their 15 years of experience to create a new standard in car washing. The Ocean Blue experience is known for consistency and a reliable standard of service. Customers receive the same safe, quality car wash every visit. “We are standardising on the same robust 3xLOGIC video surveillance system at each of our locations,” said Alexander J. Lazar, Owner and General Manager, Ocean Blue Car Wash. Thus far, four Ocean Blue locations have each deployed, or will soon finish deploying, 3xLOGIC V7000 NVRs and 32 V-Series 4MP dome cameras. “We really like Shane Hepola and DC Pro Systems. He brought us the 3xLOGIC technology, and I trust him and the quality job they do.” 3xLOGIC high-resolution cameras “These high-resolution camera views keep my employees on point and they keep my customers on point, too. The 3xLOGIC cameras pay for themselves. I’ve got cameras everywhere, recording everything. If we’ve caused damage to a vehicle, if we’re liable, we’ll certainly pay for it. However, the proof is in the video and if there is any question about a claim, the video doesn’t lie,” said Lazar. “Any story you can imagine from the customer, we’ve experienced it, including slip and fall claims,” Lazar continued. “We need that 4 MP resolution; it keeps our employees honest and it also deters potential robberies. Our multiple cameras provide so many interior and exterior views that we capture a lot of the surrounding properties and highway, so we can be an asset to law enforcement when needed.” On-site and remote video monitoring He further adds, “I’m not at all the different sites every day, but at any given time I can log in and watch what’s going on. I’ve got a bird’s eye view, so I can catch equipment malfunctions before my staff does. Sometimes, when I wake up at 2 am, I can quickly log on to view my locations. I’ll do a night audit to check lighting, building signs, and other things. We’re not there but the cameras are—24/7/365.” Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations. At this time, the company is expanding to a fifth location, there are plans to build another, and by end of 2020 there will be six Ocean Blue locations. All six will have the same robust, high-functioning 3xLOGIC video surveillance, installed by DC Pro Systems. VIGIL Central Management (VCM) An interesting add-on feature for Ocean Blue is a 3rd-party software app that takes footage from the 3xLOGIC cameras to determine spacing between the cars during the wash process. If two cars come within a certain number of feet from each other, the line shuts down automatically. Another improvement Lazar and Hepola are discussing is to implement 3xLOGIC VIGIL Central Management (VCM). VCM is a health monitoring software component of the VIGIL video management system that alerts either DC Pro or Ocean Blue to any malfunctions on the network before such developments create a problem. “The system is very user friendly,” said Lazar. “Basically, we’re trying to kill all the blind spots on the property, and I use the video for training purposes, too. We’ve got monitors in our offices and in the customer areas. That’s telling my customers we’re watching everything, and their cars are safe; and it’s keeping my employees doing great work,” Lazar concluded.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organised at a grand scale at Nasik, Haridwar, Ujjain and Prayag. As Kumbh Mela is celebrated after a period of 12 years in Nashik, 100 million people visit and therefore security is a major concern for the Government bodies. Railway stations are highly congested areas. So, one of Matrix Comsec's biggest challenges was to install devices and set up a control room for monitoring railway station entrances, platforms and connecting bridges at the busy Nashik railway station. Moreover, a restricted bandwidth for the video surveillance solution made the entire process all the more challenging. And lastly, the authorities also wanted the storage of the entire 4 month period as evidential proof. 24*7 video surveillance solution Matrix’s complete Video Surveillance solution was a highly efficient and cost-effective one Matrix used its unique Cascading feature to connect all the devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. Also, Matrix Comsec provided 4-months scheduled backup of all cameras configured centrally for storing all the streams. Moreover, Matrix Comsec completed the entire installation within 20 days with the help of highly skilled manpower. Being an Indian brand, efficient pre-sales and post-sales support was already a part of the solution. Matrix left no stone unturned in making sure that the visitors suffered no hassles during their Kumbh Mela visit. To facilitate this, Matrix Comsec secured the Entry & Exit from the city with our 24*7 Video Surveillance solution. Centralised monitoring software This led to enhanced security and smooth execution of the event. Moreover, the solution was highly cost-effective as the need of security manpower was replaced with centralised monitoring of all locations. Also, due to the use of IP cameras, the wiring cost of such an extensive installation was also reduced. So, all in all, Matrix’s complete Video Surveillance solution was a highly efficient and cost-effective one. Products Offered: SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralised Monitoring Software (CMS)
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Network cameras: Manufacturers & Suppliers
- Dahua Technology Network cameras
- VIVOTEK Network cameras
- Hikvision Network cameras
- Axis Communications Network cameras
- Arecont Vision Network cameras
- Panasonic Network cameras
- Messoa Network cameras
- Sony Network cameras
- Basler Network cameras
- Hanwha Techwin Network cameras
- Vicon Network cameras
- LILIN Network cameras
- Pelco Network cameras
- Bosch Network cameras
- FLIR Systems Network cameras
- eneo Network cameras
- Surveon Network cameras
- IDIS Network cameras
- Brickcom Network cameras
- Visionhitech Network cameras