Network Video Recorders
Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, and Olympic Broadcasting Services (OBS), has announced the launch of OBS Cloud 3.0 for the Olympic Games Paris 2024 (Paris 2024). A combination of cloud technologies powered by AI, OBS Cloud 3.0 makes the work of OBS and Media Rights-Holders (MRHs) easier and more efficient. For Paris 2024, OBS Cloud 3.0 will serve as the backbone infrastructure supporting several critical functions, fully utilising the benef...
Matrix successfully showcased its advanced security products and solutions at the 5th edition of the Rail and Metro Technology Conclave, held at Hotel Le Méridien, in New Delhi, India, from July 23-24, 2024. As the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways, Matrix highlighted its STQC-certified network cameras, adhering to the OWASP ASVS 4.0 L2 standards for cybersecurity compliance. These cameras ensure that critical passenger video data remain...
As the anticipation builds for the 2024 Paris Olympics, security concerns are heightened. While this long-awaited event will showcase the world’s most accomplished athletes, the safety of all participants and spectators is paramount. Extensive preparations have been underway to achieve this crucial goal. Security challenges The threat landscape in the historical context The security challenges facing the Paris Olympics are underscored by ongoing global conflict, an ever-evolv...
Mayflex, the distributor of Converged IP Solutions has added the full range of Gardner Engineering CCTV bracketry to their product portfolio. Gardner Engineering is a British CCTV mount manufacturer that prides itself on design excellence. They have a focus on sustainability with their products being manufactured at their facility in Lancashire and utilising the closest possible suppliers to minimise the production ‘miles’ involved in the logistics and production process. All Produ...
Taking place in Stavanger, Norway on 26-29 August, this pioneering biennial exhibition and conference will see Teledyne Gas & Flame Detection (Teledyne GFD), Teledyne FLIR and Teledyne Marine display numerous innovations on their shared stand that take safety to new levels in these potentially hazardous industries. Teledyne will also introduce advanced emission monitoring solutions to meet the latest legislative requirements and deliver effective LDAR solutions. By...
Synectics has increased its rapidly growing healthcare portfolio, with two more NHS trusts opting to enhance its surveillance and security management with Synergy software. Multi-phase, multi-site upgrades The undisclosed NHS Trusts will use Synergy as the foundation for multi-phase, multi-site upgrades of their systems. The first project will help one of the UK’s busiest Trusts unify and improve surveillance across two major hospitals and one community facility. Surveillance cameras...
News
Matrix is excited to present its security products and solutions at Hotel Le Méridien, New Delhi, during the 5th edition of Rail and Metro Technology Conclave, 2024. Network cameras Matrix is the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways. Matrix network cameras have been certified by the STQC, Delhi lab for adhering to the OWASP ASVS 4.0 L2 standards required by RDSO for cybersecurity compliance. Cybersecurity compliance Matrix experts will discuss their cutting-edge IP Video Surveillance, Access Control, and Time-Attendance solutions Matrix network cameras are designed to ensure that the data gathered by these cameras is secured against cyber threats at the time of transmission and storage, protecting critical passenger video data. At the event, Matrix experts will discuss their cutting-edge IP Video Surveillance, Access Control, and Time-Attendance solutions, especially suited to the Metro Rail Systems. Ruggedised IP camera Matrix's newly launched ruggedised IP camera, which is EN50155 compliant, will be highlighted. Engineered to withstand vibrations and shocks, these cameras are tailor-made for the demanding environments of railways and roadways. Matrix ruggedised IP cameras redefine surveillance in transportation, offering impeccable video quality, exceptional low-light sensitivity, and versatile monitoring capabilities for rail and road applications. They ensure crystal-clear footage even inside fast-moving vehicles, setting a new benchmark in surveillance technology for dynamic industries. Bullet and dome IP cameras Furthermore, Matrix will discuss its existing line of Project Bullet IP cameras, and Project Dome IP cameras, specifically designed for large-scale organisations. These cameras are RDSO 6.0 ready and offer high-resolution imagery for enhanced clarity and protection. COSEC ARGO FACE Its deep learning algorithm ensures swift identification in under 0.5 seconds, with a user capacity of 50,000 In the domain of Access Control and time attendance, Matrix experts will discuss COSEC ARGO FACE, an intelligent door controller featuring high-speed face recognition technology. With cutting-edge features such as Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion, this device addresses evolving security threats. Its deep learning algorithm ensures swift identification in under 0.5 seconds, with a user capacity of 50,000, providing organisations with top-tier security. COSEC VEGA FAXQ210 Matrix experts will also discuss COSEC VEGA FAXQ210, a groundbreaking embedded Linux-based AADHAAR-enabled biometric attendance device, registered on the AEBAS Server. With authentication in under 1.5 seconds, it seamlessly verifies users through their AADHAAR number stored in the smart card and fingerprint. This device offers reliability, convenience, speed, and data security, empowering government organisations to optimise workforce productivity. Railway and metro solutions Matrix eagerly anticipates presenting its advanced security solutions tailored for Railway and Metro systems at the upcoming Rail and Metro Technology Conclave. Kaushal Kadakia, Marketing Head, Matrix, remarks, "The Rail and Metro Technology Conclave is an ideal venue for us to present our specialised security solutions for Indian Railways and Metro Rail Systems. We are eager to connect with key government decision-makers to discuss potential collaborations and advancements in Railway and Metro security."
March Networks® is proud to announce its important role in the security setup for the Paris 2024 Games, specifically the Stade Nautique de Vaires-sur-Marne and the Vaires-Torcy leisure complex. March Networks' cameras The Stade Nautique, set to host the rowing and canoe-kayak events, is under the vigilant surveillance of March Networks’ intelligent cameras. This system, deployed in partnership with integrator RJ45 Technologies plays a key role in both physical and material security for the site. “March Networks is honoured to contribute to the security of such a prestigious global event as the Paris Games. Our technology and expertise help both athletes and spectators focus on the games, knowing they are protected,” said Claus Rønning, Vice President for March Networks in Europe. Command Enterprise Software Streamlined monitoring, control, and data retrieval across multiple locations, providing security The Vaires-Torcy leisure complex, accommodating athletes, spectators, and tourists, features a comprehensive, solar-powered security camera setup. Both sites are interconnected via a 5 km-long radio link. March Networks Command Enterprise Software centralises all camera feeds, providing strategic views and comprehensive coverage on a large video wall. Centralised management in video surveillance is crucial for efficient, consistent, and streamlined monitoring, control, and data retrieval across multiple locations, providing security for the expected 30,000 daily spectators at the site throughout the games. Advanced security solutions March Networks leverages its experience as a trusted partner to more than 1,000 financial institutions, 300 retail brands, and 800 commercial and industrial businesses worldwide, to deliver the same advanced security solutions for large-scale events like the 2024 Games in Paris. “Working with March Networks has always been a rewarding experience. Their enterprise-class technology and dedicated support team enable us to deliver exceptional security solutions. This project for Paris 2024 is a testament to our long-standing and successful collaboration,” commented Bujar Marevci, President of RJ45 Technologies. Safe, innovative, and effective technology March Networks continues to set the standard for intelligent video surveillance solutions, helping ensure the safety of people and property at major events and with businesses worldwide. Its strategic deployments and partnerships underscore our commitment to providing innovative and effective security technology tailored to many industry sectors.
Hikvision, a manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to introduce the new 4 MP DeepinView Varifocal Bullet Camera, a cutting-edge addition to its product lineup. DeepinView Varifocal Bullet Camera This innovative camera is packed with functionality, featuring 10 switchable AI functions including Road Traffic and Vehicle Detection capabilities, making it an essential tool for modern surveillance needs. “Our new DeepinView Varifocal Bullet Camera is designed to meet the diverse needs of our customers by combining multiple AI functionalities with advanced imaging technologies,” said John Xiao, Vice President of Marketing, Hikvision USA. Versatility and performance “This camera represents a significant step forward in security technology, offering unparalleled versatility and performance across applications, including LPR.” Equipped with embedded deep-learning-based licence plate capture and recognition algorithms, this camera excels in capturing and recognizing plates without additional hardware. Advanced features The camera includes a built-in heater on the front viewing window for clear images in snow or cold It offers a range of advanced features, including 25x (4.7 mm -118 mm) optical zoom for capturing details in remote areas, clear imaging against strong backlight with 140 dB WDR technology, and efficient H.265+ compression technology to save bandwidth and storage. The camera also includes a built-in heater on the front viewing window for clear images in snow or cold, a built-in gyroscope for stable image output, water and dust-resistant (IP67), and vandal-proof rating (IK10). AI functions The switchable AI functionality encompasses a broad range of features that support advanced analytics and business intelligence. These include: Face authentication Perimeter detection Multi-target type detection Queue management Regional people counting Multi-dimensional people counting Hard hat detection On/off duty detection Heat mapping Licence plate recognition
Verkada, a pioneer in cloud-based physical security solutions, announced it will offer customers a new AI-powered search in Beta. Leveraging a large language and large vision model, Verkada’s AI-powered search will enable customers to use everyday language to search their video security camera footage for people and vehicles, making their investigations even more intuitive and efficient. “Our new AI-powered search is an exciting expansion of the way that Verkada leverages the latest AI and computer vision models to keep people safe,” said Brandon Davito, Senior Vice President of Product at Verkada “We are eager to continue improving and expanding our capabilities as we make Verkada’s platform the operating system of buildings of the future.” Range of descriptive features AI-powered searches have been able to reduce the amount of time spent on investigations With the ability to search for people and vehicles across a much wider – and more granular – range of descriptive features, Verkada customers can now search through footage faster than ever. AI-powered search also enables customers to address industry-specific operational concerns – everything from retailers looking to identify shoplifters to manufacturing customers looking to ensure workplace safety. Verkada customers already beta testing its AI-powered search have been able to reduce the amount of time spent on investigations. Retail customers, for example, are saving time by searching for specific objects on a person like, “person wearing a striped sweater” or “person with a red purse near the front door.” Additional features and updates “If we know a suspected shoplifter was wearing a mask or carrying a distinctive bag, we type it into the search bar and immediately find the footage we need,” said Joe Esterreicher, Director of Loss Prevention & Risk Management at Harry Rosen, a luxury retailer. “This drastically cuts down our investigation time." Verkada also announced a range of additional features and updates across its platform, including an integration with ASSA ABLOY WiFi locks, a new Door Unlock API, four additional FIPS-validated Bullet cameras, and more.
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced the next-generation embedded software for the ITAR-free Boson+ thermal camera module, delivering high-performing uncooled thermal imaging technology for defence, firefighting, automotive, security, and surveillance applications. Featuring industry-renowned thermal sensitivity of ≤20 mK, Boson+ has been upgraded to provide even sharper thermal imagery and improved spatial filtering. Continuously improved thermal performance and proven market-leading reliability make Boson+ the low-risk integration choice for unmanned platforms, security applications, handhelds, wearables, and thermal sights. Boson thermal camera module "Boson+ shares the industry-leading size, weight, and power (SWaP) of the widely deployed and real-world-proven Boson thermal camera module, simplifying integration and shortening time to market for our customers," said Dan Walker, Vice President, Product Management, OEM Cores, Teledyne FLIR. He adds, "With software updates including new colour palettes, low gain mode, and an updated GUI, the AI-ready Boson+ continues to be the go-to thermal module for defense, industrial, and commercial integrators." Teledyne FLIR Prism AI software Made in the USA, the 12-micron pixel pitch Boson+ is available in both 320 x 256 and 640 x 512 resolutions Boson+ interfaces seamlessly with the new Teledyne FLIR AVP, an advanced video processor that powers Prism™ AI and computational imaging at the edge. The AVP, built on the latest Qualcomm QCS8550, efficiently runs Teledyne FLIR Prism AI software providing detection, classification, and target tracking. To improve data fidelity and enhance decision support, it also operates Prism ISP algorithms including super-resolution, image fusion, atmospheric turbulence removal, electronic stabilisation, local-contrast enhancement, and noise reduction. Made in the USA, the 12-micron pixel pitch Boson+ is available in both 320 x 256 and 640 x 512 resolutions. The noise equivalent differential temperature (NEDT) of 20 mK or less offers significantly enhanced detection, recognition, and identification (DRI) performance. Improved video latency enhances tracking, seeker performance, and decision support. Teledyne FLIR Technical Services Truly designed for integrators, the Boson+ is available with a variety of lens options, comprehensive product documentation, an easy-to-use SDK, and a user-friendly GUI. Customers have access to the US-based Teledyne FLIR Technical Services team to reduce development risk and cost. Boson+ is dual use (non-ITAR) and is classified under the US Department of Commerce jurisdiction as EAR 6A003.b.4.a. The Teledyne FLIR Boson+ is available for purchase globally from Teledyne FLIR and its authorised dealers.
Asia’s largest rail network, Indian Railways, is using an IDIS video solution integrated with facial recognition as part of an ambitious, multi-phase technology upgrade targeting significant growth. Modernising Indian railways With around 14,000 trains operating on 65,000 miles of track, Indian Railways carries an estimated 9.5 million passengers daily and is modernising its systems as it looks to handle up to 40% of global rail activity by 2050. Following a competitive tender, the IDIS video solution has been rolled out by Indian systems integrator M2M Cybernetics in partnership with IDIS Securitatem Solutiones Pvt Ltd, a joint venture with IDIS. The first stage project, in the eastern region, covers 230 stations with the highest daily footfall. IDIS video solution A monitoring centre at every fifth station allows the Railway Protection Force to conduct simultaneous live viewing The video system, which included 4K cameras, AI-powered video analytics, and facial recognition, was installed across hundreds of platforms. A monitoring centre at every fifth station allows the Railway Protection Force to conduct simultaneous live viewing of each location, with monitoring hubs managed using a federated architecture to provide an overarching central command and control room, which also serves as a data centre and disaster recovery facility. IDLA and facial recognition Monitoring staff are supported by IDIS Deep Learning Analytics (IDLA) with functions including motion, loitering, and abandoned object detection and line crossing, continually refined to ensure industry-best performance which makes it easy to configure and automate alerts to a range of potential risk events. Facial recognition is also a key feature of the upgrade, and the IDIS solution was seamlessly integrated with Herta Security’s facial recognition technology, which uses advanced algorithms to provide real-time identification and alerts to persons of interest. IDIS Intelligent Codec with MAT compression technology Cybersecurity was paramount for Indian Railways, and all IDIS devices cleared the OWASP Level 2 IDIS Intelligent Codec combined with MAT compression technology delivered a 30% data bandwidth reduction, with no compromise on crystal clear image capture. Further savings on storage were delivered by Motion Adaptive Technology (MAT), which adjusts recording when there is no movement in the scene. Cybersecurity was also paramount for Indian Railways, and all IDIS devices cleared the OWASP Level 2 – Appendix C certification standard, going beyond standard penetration tests. IDIS Solution Suite (ISS) VMS platform The entire solution operates on the IDIS Solution Suite (ISS) VMS platform, handling multiple high-performance IDIS servers in a federated architecture. ISS comes with vital features including Critical Failover redundancy, storing video data on a high-speed Storage Area Network (SAN) utilising RAID 5 to protect against gaps in recording during network interruptions. IDIS Mobile Plus app ISS allows image and video capture from smartphones to be fed into the surveillance system With the IDIS Mobile Plus app, Railway Protection Force staff can also take advantage of enterprise-class VMS tools via their smartphones or tablets. ISS also allows image and video capture from smartphones to be fed into the surveillance system, adding significantly to the potential surveillance reach – for example, allowing local staff to send on-site reports of damage or incidents, channelling them directly to command centres. Future-proof video surveillance solution “Indian Railways wanted the most flexible, robust, future-proof video surveillance solution to provide a secure foundation for growth and development plans,” said Rahat Jain, Managing Director, IDIS Securitatem Solutiones Pvt Ltd. “With IDIS video, the Railway Protection Force now have full confidence that they are operating 230 of the safest and most secure stations, resulting in two more regions being identified for upgrade.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Case studies
One of the pioneering players in the global packaging ecosystem, this manufacturing facility transforms over 100,000 tonnes of paper, paperboard, and laminates annually into diverse, high-value packaging solutions. Established in 1925, it caters to industries such as food and beverage, personal care, and consumer goods, with a robust presence across India and select global markets. Recognised for operational excellence and innovation, the business holds numerous prestigious awards and certifications. With a strong focus on customer delight and sustainable packaging, it partners with major brands like P&G, Nestle, and Unilever. Business Scenario To address these challenges effectively, the facility of a video surveillance system was felt essential Without a video surveillance system in place, the company faced recurring security breaches and unauthorised access to its manufacturing units, which raised significant concerns for employee safety and the protection of assets. Instances of product mishandling and operational inefficiencies went unnoticed, underscoring the critical need for a video surveillance system. To address these challenges effectively, the installation of a video surveillance system was deemed essential. Additionally, they wanted a video surveillance system that ensured uninterrupted monitoring to avoid missing crucial events. Challenges Security Vulnerabilities: The absence of a video surveillance system posed risks to employee safety and the protection of valuable assets such as machinery, raw materials, and finished products. Operational Oversight: Instances of product mishandling were not promptly detected or addressed due to the lack of a robust video surveillance system. This compromised productivity, and quality control within the manufacturing unit. Loss Prevention: The inability to monitor activities effectively increased the risk of inventory shrinkage, theft, or damage to goods. This not only affected financial losses but also disrupted supply chain operations and customer deliveries. Inaccurate Weighbridge Monitoring: Inaccurate weighbridge monitoring made it difficult to verify truck weights before and after loading, which caused fraud and serious operational issues. Regulatory and Compliance Risks: Without a proper video surveillance system, it was challenging for the manufacturing unit to meet stringent regulatory standards, potentially leading to regulatory penalties. Solution Solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the digit plate All the vehicles entering and exiting the premises were monitored with Matrix Automatic Number Plate Recognition Solution. This solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the number plate. SATATYA SAMAS - Video Management Software then uses OCR technology to convert this captured number plate image into a digital number and store it in the database. The loading and unloading facility was closely monitored with the help of Matrix Weighbridge Monitoring Solution. This aided in the accurate tracking of shipments, which prevented fraud. Matrix 5MP Dome Cameras were strategically placed above production floors, assembly lines, packaging areas, and quality control stations within the manufacturing and warehouse facility. These cameras provided detailed monitoring of manufacturing processes, ensuring product quality and operational continuity with clear footage. Additionally, they were installed in administrative offices, break rooms, and training areas contributing to workplace safety. Matrix 5MP Bullet Cameras were deployed for robust outdoor and perimeter surveillance. They monitored loading docks, outdoor storage yards, parking lots, and security checkpoints. These cameras secured critical infrastructure such as HVAC rooms and electrical rooms, ensuring the safety and integrity of vital systems. SATATYA SAMAS - Video Management System The video surveillance system was configured in such a way that ensured uninterrupted recording All 100+ cameras were integrated with SATATYA SAMAS - Video Management System aiding in live view, and playback of the network cameras in the premises. The facility also opted for the CREAM (Cognitive Response Engine and Automated Monitoring) module in SATATYA SAMAS to improve employee safety. Two IVAs were configured in this case - Tripwire and Motion Detection. The Tripwire IVA could be used to monitor specific areas that had to be obstructed, while Motion Detection IVA helped in identifying accidents or unusual activities in the obstructed areas. Both IVAs worked in tandem, providing real-time alerts and video pop-up notifications. The video surveillance system was configured in such a way that ensured uninterrupted recording. Even if the recording server failed, the recording would be pushed to the management server by the network cameras. When the recording server was functional again, the footage was again pushed to the management server. Products Offered: SATATYA SAMAS PLT (1No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM5 (24 Nos.): Licence for Adding 5 Additional Cameras SATATYA SAMAS USER3 (01No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR3 (01No.): 3 Camera Licences for Automatic Number Plate Recognition SATATYA SAMAS CREAM5 (01No.): 5 Camera Licences for Automated Monitoring SATATYA CIBR50MVL12CWP P2 (04 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIBR50FL40CWS P2 (63 Nos.): 5MP IR Bullet Camera Fixed 4mm Lens SATATYA CIDR50FL40CWS P2 (53 Nos.): 5MP IR Dome Camera Fixed 4mm Lens Benefits The manufacturing facility is extremely satisfied with Matrix Video Surveillance System and is now planning to rely on Matrix for its needs at additional plant locations across India. Matrix's Automatic Number Plate Recognition (ANPR) and Weighbridge Monitoring Solutions streamlined operations by accurately tracking vehicles entering and leaving the premises, reducing manual errors and cutting down on weighment fraud. Employees experienced a greater sense of security with the help of CREAM in Matrix VMS, as it lowered the risk of accidents in the facility. With regular monitoring, the video surveillance system minimised product mishandling and prevented process errors, while also protecting assets and machinery. Matrix Network Cameras kept a constant watch over inventories, warehouses, and storage yards, making it easy to track stolen goods using surveillance footage. Matrix VMS and the server systems ensured 24/7 recording of the facility, maintaining continuous surveillance even in critical situations, providing a reliable and secure environment.
One of India's fastest-growing entertainment networks, renowned for its iconic brands, offers a diverse array of experiences across multiple platforms. This network profoundly impacts the Indian entertainment landscape, engaging audiences through its on-air, online, on-ground, cinema, and merchandise properties. With a portfolio of over 30 channels, it captivates audiences nationwide with a variety of programming, including general entertainment, movies, sports, youth content, music, and children's genres. Additionally, the network has been successfully producing and distributing acclaimed Hindi and regional films in India for over a decade. Challenge/requirements The client required a unified communication solution, prioritising emergency communication, for over 500 users. Future scalability was a crucial factor as well. A major challenge involved integrating Matrix devices with existing SIP-enabled systems. Their key requirements were as follows: Unified Communication Solution: Implement a system that ensures seamless connectivity across various devices via a single unified communication platform. Mobility: Guarantee connectivity for users on the go. SIP Integration: It was essential to integrate Matrix devices with the existing SIP-enabled systems to maximise investment efficiency without revamping the current infrastructure. Emergency Communication: Provide features that facilitate contacting emergency services during times of distress. Redundancy: To minimise or eliminate downtime, particularly during emergencies, redundancy was a critical requirement. Solution Matrix, in collaboration with Space Office Systems (I) Pvt. Ltd., created a Unified Communication solution that integrated existing devices with Matrix devices via SIP. This solution included the ANANT unified communication server, standard SIP desk phones, and the VARTA softphone. The deployment was carried out as follows: The server-based PBX, ANANT, housed in the server room, provides LAN and WAN connectivity with the crucial feature of redundancy. The media house utilised ANANT's LAN connectivity, facilitated by a network switch that allowed multiple devices on the premises to access IP connectivity. The network switch, connected to ANANT via LAN, provides connectivity for SPARSH VP510 and SPARSH VP210 phones, along with the VARTA softphone. Moreover, a connection through the router facilitates SIP integration with third-party devices via the SIP trunk. Results Emphasising SIP integration of Matrix devices with existing systems optimised investments The results included significant enhancements to their communication capabilities. Collaboration was streamlined through a unified communication solution, and mobility was boosted with VARTA. Emphasising SIP integration of Matrix devices with existing systems optimised investments. Overall, the solution markedly improved operational efficiency with advanced calling features. Now, let's delve into the specifics of the solution provided. Collaboration: The unified communication solution, featuring the server-based PBX ANANT, enabled seamless teamwork between office-based and mobile staff through VARTA. This ensured uninterrupted transfer and reception of information. Investment Optimisation: The SIP integration with Matrix Solution seamlessly integrated into the existing network infrastructure, meeting the client's uncompromising requirement. This integration effectively utilised current resources, eliminating the need for additional investments. Operational Efficiency: The redundancy offered by ANANT ensured minimal to no downtime, enabling smooth information flow and greatly enhancing workflow efficiency. This capability was especially critical during emergencies and related communications. Modern Features: The office now enjoys enhanced capabilities with Matrix Standard SIP desk phones such as SPARSH VP210 and SPARSH VP510. These include advanced call routeing, integration with global directories, VPN connectivity support, thereby significantly bolstering the media house's communication capabilities. The Matrix solution empowered the media house to elevate its communication capabilities with advanced call features. Notably, it excelled in emergency communication functionality, provided scalability for future needs, and seamlessly integrated with third-party devices through SIP.
The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technology made it difficult or impossible to know who had been accessing sensitive areas like treatment rooms and medicine stores. Another source of insecurity was the keys and passes issued to employees and contractors. These often remain in circulation beyond their approved use period, if former employees and service providers fail to return them. Need to upgrade access control To provide proper security for staff and patients, the hospital needed to upgrade its access control system To provide proper security for staff and patients, the hospital needed to upgrade its access control system. Meeting the demands of a large and complex site requires a flexible solution that can secure interior and exterior hospital doors, as well as multiple other types of openings. Also critical for The Marin Hospital of Hendaye is the ability to trace staff and external contractor movements into and between sensitive areas. An electronic access system with inbuilt audit trail capability was essential. Hospital access is traceable and tailored to user profiles The hospital chose an eCLIQ system based on programmable electronic keys and wireless cylinders. Since 2016, their security team has gradually rolled out eCLIQ electronic access control to all care and logistics buildings, including drug stores, labs, and other sensitive or confidential areas. The wireless eCLIQ solution offers easy installation without the expense or disruption of laying dedicated cabling. Quick and wireless installation “The choice of this solution is based on reliability and simplicity of implementation for a site that covers 11 hectares,” explains Yves Bourdon, Security Director at The Marin Hospital of Hendaye. "It is the only solution that can equip more than 1,500 doors with quick and wireless installation.” Intelligent eCLIQ key An eCLIQ solution gives managers control over important aspects of hospital security An eCLIQ solution gives managers control over important aspects of hospital security. They can issue access tailored to an individual’s needs and level of authority and amend it whenever required. External service providers use an intelligent eCLIQ key which automatically expires after a pre-defined period. This is much safer than relying on a contractor to return their mechanical key every time. Security, comfort, and flexibility Employees enjoy much greater comfort and convenience: Carrying a single eCLIQ key programmed with their permissions makes bulky key bunches a distant memory. “The Marin Hospital of Hendaye has gained in security, comfort, and flexibility. Employees hold only one key compared to 5 or 6 keys before,” adds Yves Bourdon. The rollout is ongoing, with another 500 eCLIQ cylinders already ordered and ready to install. The eCLIQ programmable key solution The eCLIQ cylinder range can bring almost any opening into an electronic access control system A fully electronic extension of ASSA ABLOY’s award-winning CLIQ® access control technology, eCLIQ is built around precision-engineered locking cylinders and high-end microelectronics. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between lock, key, and system. The eCLIQ cylinder range can bring almost any opening into an electronic access control system. Robust, durable eCLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more with the same control as sensitive doors. Programmable, wire-free access control “Like many hospitals around Europe, The Marin Hospital of Hendaye now relies on programmable, wire-free access control which is backed by decades of ASSA ABLOY investment and innovation in lock and key technologies,” says Tatiana Bezie, Sales Manager at ASSA ABLOY Opening Solutions France. “Organisations equipped with eCLIQ intelligent key-based access control can have confidence that their premises and employees are secure.”
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
A mix of Hubble Panoramic and PTZ cameras from Dahua Technology have been installed at Tripoli Stadium in Libya to help it meet modern international standards. Built in 1970, it is the largest Olympic stadium in the country and has been renovated and refurbished to meet FIFA’s requirements for stadium safety and security. Challenges With a capacity of 50,000 spectators, the stadium becomes crowded on match days and control of spectators and crowds becomes paramount. With only a limited number of police, security and stadium staff to rely on, stadium managers needed to have an overview of crowd flows and potential congestion to help ensure safety at these busy times. In addition, the stadium needed to stream images of match action to large screens strategically located inside and outside the stadium for fan interaction, as well as provide screens for advertising. Solution Cameras contain wise roles such as face recognition, perimeter protection and people-counting A mixture of eight Hubble panoramic and more than 180 WizMind 5 series cameras have been installed at the stadium to improve the situational awareness for stadium managers and the security team. The Hubble cameras are situated high up in the stadium to provide a panoramic overview, while being able to track specific incidents. They consist of an array of fixed cameras providing 180o, 270o or 360o coverage, together with an integrated dome camera to zoom into a particular scene and track specific objects. With Ultra HD resolution of up to 24MP, Hubble also features crowd number and density detection, vehicle-counting and density monitoring and augmented reality mapping. Dahua’s DSS video management software The cameras are available in dust-proof, waterproof and vandal-proof versions Also installed are more than 180 WizMind 5 series cameras. Featuring Starlight and deep learning algorithms, the cameras incorporate intelligent functions such as face recognition, perimeter protection and people-counting, which all greatly improve the accuracy of video analysis. The cameras are available in dust-proof, waterproof and vandal-proof versions. Intelligent recognition plays a big part in the security of the stadium, with cameras being able to identify and subsequently track any blocklisted suspects. This feature is also used at the entrance of the stadium to validate authorised ticket holders. Also installed are giant 15m x 9m LED screens to provide images of play on the pitch, as well as advertising coverage. All equipment is managed by Dahua’s DSS video management software located in the central control room. Results The installation of the Dahua equipment has provided stadium staff and security personnel with a high degree of situational awareness at the venue. They are now able to control access to the stadium through face recognition, anticipate overcrowding and potential congestion points with automatic heat mapping from camera images and track suspicious people or potential incidents. The cameras also provide a high degree of perimeter protection to detect and track abnormal intrusion.
A renowned global pioneer in international education services provides various programs and comprehensive support to students pursuing their educational goals abroad. Originating from Australia in 1969, its primary objective has been facilitating educational opportunities worldwide. The company is closely associated with IELTS (International English Language Testing System), and it assists students in studying in English-speaking nations like Australia, New Zealand, Canada, Ireland, the UK, and the US. Company profile In India alone, it has over 70 offices across 61 cities and grew its operations in Southeast Asian nations Situated in Delhi, India, the company’s Indian headquarters serves as a central operational hub, addressing the diverse needs of Indian students aspiring for overseas education. With a team of dedicated experts, the centre offers students personalised guidance, counselling, and support nationwide. In India alone, it has over 70 offices across 61 cities and expanded its operations in Southeast Asian countries. Motivated by a commitment to excellence, integrity, and student success, the company continues to empower individuals, fostering global connections and promoting cultural understanding through international education. Challenges Ensuring the integrity of its assessment process Needed a standard procedure that could be replicated across 61 locations Evidence capturing to confirm the identity of the student appearing for the exam Needed a surveillance solution that ensured compliance at the centre Need to capture footage locally and centralised monitoring The surveillance solution should be dependable, scalable, and interoperable Business scenario The institute sought a wide surveillance solution that captured the details of every student As the co-owner of the IELTS, the institute faced significant challenges in ensuring the integrity of its assessment process for students studying in English-speaking countries. With centres spread across India and other Southeast Asian countries like Sri Lanka, Bangladesh, and Bhutan, they needed a reliable surveillance solution to verify the identity of candidates at their assessment centres. It was crucial for the assessment process to be standardised across 61 locations and easily replicable in new centres. With 11 assessment centres and 49 centres where students arrived for assessment, the institute sought a comprehensive surveillance solution that captured the details of every student entering their premises and cross-referenced them with their system centrally. Additionally, they required a robust recording architecture to store video evidence for future reference as needed securely. In essence, the company faced the distressing challenge of establishing a surveillance solution that was dependable, scalable, capable of capturing essential details, and interoperable. They needed a distributed architecture with centralised control to meet their surveillance requirements effectively. Solution The surveillance solution comprised of: The challenges faced by the institute were swiftly assessed by Matrix experts, who devised a robust surveillance structure to ensure compliance across multiple centres in India and abroad. In all 61 centres, Matrix 2MP PTZ cameras with 25x optical zoom were strategically installed to capture the faces of candidates arriving for tests and match them with their recorded details in the system. The movement of each candidate was meticulously recorded in the system to maintain accurate identity records. The action of each candidate was meticulously recorded in the system to keep real identity records Further, the accuracy was enhanced by adding a secondary layer of surveillance to monitor compliance with the SOP. Matrix PTZ cameras with 25x optical zoom adeptly captured intricate event details recorded in the computer. To meet the needs of each centre, NVRs (Network Video Recorders) with different capacities were installed. This enabled the local recording of details at each centre. Following the client's specifications, the NVRs were configured to store recorded details for three months. Additionally, cameras were installed at the 11 OSM sites to ensure compliance at the places where the papers were assessed. Products offered SATATYA MIBR20FL36CWP: 543 2MP IR Bullet Camera with 3.6mm Lens with Audio SATATYA MIDR20FL36CWP: 264 2MP IR Dome Camera with 3.6mm Lens with Audio SATATYA PZCR20ML25CWP: 76 2MP Pan-Tilt-Zoom Camera with 25x Optical Zoom SATATYA NVR1601X - 8 Nos 16 Channel NVR with 1 SATA Port SATATYA NVR1602X - 8Nos 16 Channel NVR with 2 SATA Port - 8 Nos SATATYA NVR3202X - 1Nos 32 Channel NVR with 2 SATA Port SATATYA NVR3204X - 31Nos 32 Channel NVR with 4 SATA Port SATATYA NVR6404X - 2Nos 64 Channel NVR with 4 SATA Port SATATYA NVR6408X - 7Nos 64 Channel NVR with 8 SATA Port MATRIX LICENCE DONGLE 200 Enterprise VMS: USB Dongle to Run Licence Application SATATYA SAMAS PLT Enterprise VMS: Software for up to 65,535 Cameras SATATYA SAMAS CAM100 - 5Nos Enterprise VMS: 100 Camera Licence SATATYA SAMAS USER3 - 5Nos Enterprise VMS: 3 Concurrent User Licence Benefits Enhanced Assessment Integrity: By implementing Matrix 2MP PTZ cameras with 25x optical zoom across all 61 assessment centres, the company ensured the integrity of the assessment process. These cameras meticulously capture the faces of candidates arriving for tests, allowing them to verify their identities and maintain accurate records. Standardised and Replicable Procedure: The Education Centre needed a standard procedure that could be replicated across the extensive network of centres. The Matrix surveillance solution provided it with a standardised approach that could be easily implemented in new locations, ensuring consistency in its assessment process. Compliance Assurance: The addition of Matrix PTZ cameras with 25x optical zoom and a secondary layer of surveillance helped them monitor and ensure compliance with the Standard Operating Procedures (SOP) at all times. Dependable and Scalable Surveillance: Matrix's NVRs with different capacities allowed the Institute to locally store recorded details at each centre while ensuring reliability and scalability for future expansion. Centralised Monitoring: To streamline the operations, they needed a surveillance solution that allowed seamless central monitoring. Matrix's solution facilitated the cross-referencing of student details with their system centrally and, enhancing efficiency and data accuracy. Interoperability: Matrix's surveillance solution is designed to be interoperable, ensuring seamless integration with the existing infrastructure. This interoperability enables them to adapt to evolving technological requirements while maintaining the integrity of the assessment process. In summary, Matrix's comprehensive surveillance solution not only addressed the immediate challenges but also provided a robust foundation for the assessment process, enabling them to uphold the highest standards of integrity, compliance, and efficiency across all assessment centres.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
Cloud implementations enable organisations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in the world. But on-premise video management systems (VMSs) still have a role to play, don’t they? We asked this week’s Expert Panel Roundtable: What is the continuing role of video management systems (VMS), given the growth in Video Surveillance as a Service (VSaaS)?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Improving city mobility using connected video technology](https://www.sourcesecurity.com/img/white-papers/612/safe-city-3-920x533.jpg)
Improving city mobility using connected video technology
Download![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![Choosing the right storage technology for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/security-storage-data-920.jpg)
Choosing the right storage technology for video surveillance
Download![Video surveillance as a service: Why are video management systems migrating to the Cloud?](https://www.sourcesecurity.com/img/white-papers/612/vsaas-920.jpg)
Video surveillance as a service: Why are video management systems migrating to the Cloud?
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![The borderless control room](https://www.sourcesecurity.com/img/white-papers/612/borderless-control-room-920.jpg)
The borderless control room
Download![Wireless Access Control eBook](https://www.sourcesecurity.com/img/white-papers/612/wireless-access-control-ebook-920.jpg)
Wireless Access Control eBook
Download![Six things to look for when adding AI cameras to your operation](https://www.sourcesecurity.com/img/white-papers/612/hanwha-pic.jpg)
Six things to look for when adding AI cameras to your operation
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Security investments retailers should consider for their 2021 budget](https://www.sourcesecurity.com/img/white-papers/612/retail-security-investments-for-2021-budget-920_1603476210.jpg)
Security investments retailers should consider for their 2021 budget
Download![Enhanced Ethernet Technology (ePoE)](https://www.sourcesecurity.com/img/white-papers/612/Dahua-ePoE-620x360.jpg)
Enhanced Ethernet Technology (ePoE)
Download![IP in a box: The advantages of embedded network video recorders](https://www.sourcesecurity.com/img/white-papers/612/network-video-620x360.jpg)
IP in a box: The advantages of embedded network video recorders
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Network Video Recorders: Manufacturers & Suppliers
- Hikvision Network Video Recorders
- exacqVision Network Video Recorders
- Dahua Technology Network Video Recorders
- ADPRO Network Video Recorders
- Vicon Network Video Recorders
- Hanwha Vision Network Video Recorders
- Axis Communications Network Video Recorders
- Avigilon Network Video Recorders
- LILIN Network Video Recorders
- MOBOTIX Network Video Recorders
- Illustra Network Video Recorders
- Bosch Network Video Recorders
- AV Costar Network Video Recorders
- Milestone Network Video Recorders
- IDIS Network Video Recorders
- BCDVideo Network Video Recorders
- Speco Technologies Network Video Recorders
- March Networks Network Video Recorders
- Video Storage Solutions Network Video Recorders
- Surveon Network Video Recorders
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download