Network / IP security - Expert commentary
Although in many cases CCTV has been an effective investigation tool, its full potential is not being realised It’s all very well installing CCTV cameras, but to be effective users have to know what to do to make images available to the police and courts, according to detective chief inspector Mick Neville of the Metropolitan Police. Although in many cases CCTV has been an effective investigation tool, its full potential is not being realised, says Neville, who is due t...
Unrealistic promises by over-enthused marketers and under-delivery by R&D departments have damaged the cause of video analytics almost since its inception. For me, the exaggeration reached its worst point when industry pundits suggested that we would soon be able to identify and alert on anomalous behaviour of the kind demonstrated by the Tsarnaev brothers in the moments before the 2013 Boston Marathon Bombings. Mainstream journalists speculated that the two Chechen broth...
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic management of costs is especially important when considering video storage systems because storage accounts for such a large cost component of networked systems. Gartner’s Total Cost of Ownership (TCO) As enterprise products begin to dominate the video storage market, more attention needs to be addressed to Gar...
Not too long ago the idea of home automation was strictly the province of the rich and famous. With costs that soared as high as $100,000 or more, controlling HVAC, lighting, doors and security from a single source just wasn’t in the budget for Main Street America. That was then, but now is an entirely different story. The “connected home” in which smart phones and tablets serve as controllers for Internet-enabled devices has gone mainstream. Installers are still fashioning hi...
According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should start looking at do-it-yourself (DIY) systems such Google’s Nest and other devices as an opportunity for existing security contractors – those that are open-minded anyway – to bring in additional customers and new streams of recurring monthly revenue (RMR). DIY systems continue to proliferate in the marketplace and are availab...
Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...
The physical security community is contributing expertise and equipment of many kinds to the country As rescue teams and aid workers from around the world converge on Nepal after the country's 7.8-magnitude earthquake, the physical security community is contributing expertise and equipment of many kinds to a country whose government has described it as being “on a war footing.” At time of writing, conservative estimates of the fatalities are around 5,000, but many,...
see bigger image Figure 5: Providing correct and useful results requires intersection of user intentions, VCA interpretation, and results provided by VCA tool The term Video Content Analysis (VCA) is often used to describe sophisticated video analytics technologies designed to assist analysts in classifying or detecting events of interest in videos. These events may include the appearance of a particular object, class of objects, or action. VCA technology employs a comple...
End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also, small- and medium-sized enterprises (SMEs) are turning to networked video surveillance in larger numbers. And video is now finding many uses outside the security market, including business intelligence and customer service applications, among others. These familiar trends are directly impacting the choice of video storage solutions being used i...
Employees are the front line of defence — as well as the most economical defence — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...
Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (primary/secondary) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience...
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...
Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customised system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...
Too often a valid assumption turns out to be the opposite in practical operation It’s easy to misinterpret product specifications of IP video transmission products to the detriment of system functionality. We have seen how this problem relates to port speed, power over Ethernet (PoE) and transmission media. Now let’s look at some additional aspects of product specifications – and how they can be misinterpreted. Importance Of Temperature Rating What about te...
Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the Illinois Electronic Security Association (IESA) to validate the reason for membership. Just last week IESA members and lobbyists travelled downstate to Springfield to show support and testify against two new bills, up for debate in a senate committee hearing, that would ultimately prove harmful and create a competitive disadvantage for license...
Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...
School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...
According to a recent MarketsandMarkets report, video surveillance storage solutions and services are experiencing a rapid adoption in the industry, estimated to grow 16.3 percent each year until 2018, eventually reaching a market size of $10.41 billion. In addition to the specific image content of surveillance cameras, there are also huge amounts of data surrounding it – everything from the location to the time of day, the duration of the video, and more. And the amount of data in the ima...
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by i...
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power. Many of these involve pan-tilt-zoom (PTZ) domes and heaters and blowers that require additional power. This development created two areas of confusion which is highlighted in this article by N...
Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...
Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...
Combining thermal imaging with analytics provides a robust system Prices are dropping for thermal cameras. Now they are much more affordable for non-military customers – and more likely to be used in combination with video analytics. Combining thermal imaging with analytics provides a robust system; the technologies work well together. Thermal cameras make it easier to detect motion because you are eliminating much of the detail and only emphasising temperature “c...
Milestone Interconnect provides a cost-efficient and flexible way to have central surveillance operation across geographically dispersed sites The transportation vertical is embracing the open platform for video systems. In the past, manufacturers required transportation end users to purchase the camera, the recorders and the software all from one manufacturer. Now, with IP, organisations in the transportation vertical can use off-the-shelf cameras, servers (recorders) and sof...
Analytics at the edge provide the ability to process what is happening in a field of view and discern if a relevant alert is triggered There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For one thing, analytics at the edge provides the ability to process what is happening in a field of view and discern if a relevant alert is triggered. This can be faster and less expensive than the original video analytics model of using a separ...
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we depend on standards such as 802.3af for devices requiring up to 15.4 watts and 802.3at for devices powered up to 30 watts. We depend on the devices generating the power to be able to be read by devices receiving the power. Our dependence is not al...
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and “intelligence” about all aspects of the business. The retail vertical is leading the way in reaping the benefits of video analytics beyond the security function. There are two reasons retailers have taken advantage of video analytics far more than other vertical markets. First, retailers generally face more theft than a...
The ability to clearly see facial features and other identifying characteristics on each passenger greatly enhances security Some of the video technology used in the transportation vertical is purpose-built, but the wide range of applications and environments is conducive to a variety of general-purpose technology, too. Leading IP camera makers like Axis, Sony and Panasonic have introduced new products to enhance safety and security of travel in trains, buses or oth...
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download