CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centres. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of...
Milestone Systems, the number one global provider of open platform networked video management systems, has released Device Pack 10.1a for partners and customers using Milestone XProtect video solutions. The latest Device Pack offers new firmware support for partners Axis, FLIR Systems, Hanwha Techwin, Honeywell and MOBOTIX. New features include support for SRTP (Secure Real-time Transport Protocol), a feature that ensures that camera video streams are received via secure end-to-end encrypted tr...
Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralised video systems on the market. The MOBOTIX M...
ONVIF, global standardisation initiative for IP-based physical security products held its annual membership meeting in early November this year, with an overview of important activities of 2018 and perspective on the year ahead. Attendees heard presentations on the final release of Profile T in 2018, an advancement which represents how ONVIF keeps pace with technological advancements that affect product development and interoperability between IP-based physical security products. Profile T for...
Arecont Vision Costar, global supplier of network-based video surveillance solutions, announces the appointment of John Sprague as Regional Sales Manager. Mr. Sprague is responsible for customer and partner sales support across the Northeastern United States and Eastern Canada. The company is a new business unit of Costar Technologies, Inc. (CTSI) that first launched on July 13th, 2018 and is continuing to expand its sales and support teams across the Americas. MegaIP megapixel product line Th...
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP intercom and security solution “With no server or licence fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt...
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the selection of Brian White as Regional Sales Manager for the Great Lakes Region. The company, a new business unit of Costar Technologies, Inc. (OTC Markets Group: CTSI), was launched on July 13th, 2018 and is expanding its sales and support across the Americas. “Brian brings nearly two decades of senior-level sales experience in security and cloud computing to our customers in the Great Lakes,” said Kyle Parker, Vice President, Americas Sales. “He is very familiar with the needs of security industry end users in the territory, and skilled in engaging and supporting sales partners to deliver complete solutions.” Worked with prominent security companies Brian's previous security industry career included sales positions with Avigilon and TycoMr. White joins the Arecont Vision Costar team from his most recent posting at IDIS where he held a similar assignment. His previous security industry career included sales positions with Avigilon and Tyco, and earlier assignments in the IT and Telecommunications spaces. “Brian has demonstrated determination and innovation throughout his career in support of his customers,” stated John Bujarski, Senior Sales Director, Eastern US and Canada. “His diverse background in security and technology will help ensure his success in bringing the Total Video Solution and its components to customers in the Great Lakes region.” Total Video Solution The Total Video Solution is a comprehensive product offering introduced by the company in the first half of 2018. It includes the original MegaIP single-, dual-, and multi-sensor megapixel cameras that are used around the world by Arecont Vision Costar customers, as well as the new world-class ConteraIP single- and multi-sensor cameras, advanced ConteraVMS software, cloud-managed ConteraCMR video recorders, and ConteraWS web services. Customers can select a complete system, or integrate their choice of components with existing cameras, VMS or NVR systems Customers can select a complete system from Arecont Vision Costar, or integrate their choice of components with existing cameras, VMS or NVR systems, and infrastructure via ONVIF compliance. The Technology Partner Program and the MegaLab test facility has also been used by dozens of other industry leading vendors to go beyond ONVIF standards, ensuring the best possible integration with Arecont Vision products. “The new Arecont Vision Costar is a great opportunity for any security industry sales professional,” stated Mr. White. “I am already finding great interest among both existing and emerging customers in the company and our expanded product portfolio.” Based in the Columbus, Ohio area, Mr. White holds a BA from John Carroll University and a BS Finance from the University North Carolina-Charlotte.
Avigilon Corporation, a Motorola Solutions company, announced that Avigilon Blue, its cloud platform for video surveillance, is launching in Canada. The Avigilon Blue platform is a secure end-to-end solution that enables security integrators to deliver analytics-driven video surveillance as a service. It features patented self-learning video analytics technology that is compatible with both legacy Avigilon and third-party ONVIF compliant cameras. Powerful and easy to use, the platform enables integrators to remotely connect to, manage and service more customer sites with fewer resources. It features alarm notification and subscription dashboards that create a simple and unified view of customer accounts, sites, devices and system health. Analytics-based event detection The Avigilon Blue platform provides customers the flexibility to self-monitor their sites and leverage professional monitoring services“Following a successful launch in the U.S., the Avigilon Blue platform continues to rapidly expand,” said James Henderson, Avigilon’s President and Chief Operating Officer. “We are excited to bring this cutting-edge solution to our Canadian integrators, helping them create a new recurring revenue business model while offering additional value to their customers.” With analytics-based event detection and notification, the Avigilon Blue platform provides customers the flexibility to self-monitor their sites and leverage professional monitoring services. It features easy and secure access to their video via mobile app or desktop browser, central station software integration, as well as system upgrades and new features that are pushed directly from the cloud. The Avigilon Blue platform in Canada will leverage cloud services that are built, deployed and managed through trusted Microsoft Azure Canadian data centres, offering customers enterprise-grade security that adheres to national policy. Avigilon Blue is expected to be available in Canada in December 2018.
Soliton Systems has been named as the winner of the Airbus Critical Apps Challenge Belgium at the recent Astrid event in Brussels. With their new Zao Android App, Soliton has developed an encrypted live streaming video app that can operate on the new Airbus Tactilon Dabat device. Airbus is a pioneer in aeronautics, space and related services with their Defence and Space group as innovators in providing secure communication devices for government agencies that include emergency services. The Tactilon Dabat device is the latest innovation for emergency services in that it combines a traditional TETRA radio used by emergency services, with a ruggedised smartphone that can use 4G for a variety of related data-enabled applications. Emergency service workers Jacques Brancart, who is the Managing Director for the Proximus-Airbus consortium, explains further “As we developed the Tactilon Dabat device, we were keen to work with partners who specialise in apps that can be utilised by emergency service workers to make their jobs more efficient and safer.” A law enforcement officer need not require many different gadgets if they can be all integrated into one tool" “As we see in the corporate world that the Smartphone has become the standard for everyday business apps, we also have the same vision for the communication device used by emergency workers - it should not be restricted to only voice communications. As an example, a law enforcement officer need not require many different gadgets if they can be all integrated into one tool.” Live video streaming Brancart continued “We decided upon the Critical App Challenge in Belgium to open up the floor to all our partners to showcase an app that would benefit emergency services. We had a very large response to the competition with a shortlist of 5 that were selected to exhibit at the recent Astrid event in Brussels. The final winner was selected by the end user attendees at the show voting on their favourite app. We were delighted to announce Soliton as the winner with their encrypted live streaming app.” The 7th edition of the ASTRID User Days, held in Brussels on 3 and 4 October 2018, was a seminar and exhibition for public safety and security agencies with over 1500 people attending. ASTRID manages the voice and data communication network for all emergency and security services in Belgium. The Zao Android App was developed by Soliton Systems to enable high quality and reliable encrypted live video streaming from both the integrated cameras on Tactilon Dabat device, even when there is low signal strength or congestion caused by many users. Live evidence gathering These VMS systems are typically deployed in command and control centres and use a standard called ONVIF that we are compliant with" Shinya Hyakutake, Senior VP of Mobil Broadcasting from Soliton Systems said “The app is very simple to use but it has a lot of rich features under the cover. We are both encrypting and compressing the video using the latest video compression of H.265 with the ability to quickly live stream to existing video management systems.” “These VMS systems are typically deployed in command and control centres and use a standard called ONVIF that we are compliant with. We have an innovative road map going forward and ultimately we see the ability for this app to both enhance and replace body worn cameras that are currently in use.” Video streaming for emergency services can provide a rich source of information for many different applications from live evidence gathering, facial recognition, GPS location, covert operations, special operations, public safety, resource planning, emergency first aid and mobile surveillance. The other four shortlisted finalists for the critical app challenge was United Biometrics, Steerpath, NSION-Core and BIG.
ONVIF, the global standardisation initiative for IP-based physical security products, has announced the final release of Profile T, a new specification with advanced video streaming capabilities and an expanded feature set for metadata streaming and analytics. Profile T also offers support for H.265 video compression, which more efficiently handles image streams from high-definition cameras. With Profile T, ONVIF will employ a new media service that offers support for both H.265 and H.264 video codecs. The media service gives ONVIF the ability to more easily incorporate new video and audio codecs as needed as the industry continues to advance. By supporting H.265, Profile T supports more efficient compression rates, which translates into decreased storage requirements on hard drives and less bandwidth usage – reducing the overall costs of system ownership. Features bidirectional audio streaming The new Profile T features bidirectional audio streaming, supporting audio input as well as output from the camera “Profile T is an excellent example of how ONVIF has embraced technological advancements within its specifications to serve the changing requirements of this industry,” said Per Björkdahl, chairman of the ONVIF Steering Committee. “In addition to the H.265 support, Profile T standardises analytics, metadata streaming and other important features to satisfy current and future market requirements for end users, systems integrators and consultants.” The new Profile T features bidirectional audio streaming, supporting audio input as well as output from the camera. Using standardised event types, Profile T ensures that video management systems and other software clients use one set of events to support all cameras, regardless of manufacturer. This includes alerts such as tampering, digital input and relay output. Profile T also enables a specific area of an image to be selected for analysis, using the conditional motion region detector configuration through the analytics service. Profile T also covers the streaming of metadata, including analytics and events.
Hikvision showcased their latest alarm solutions at Security Essen, with a keen focus on integration, demonstrating the company’s commitment to providing extensive security solutions to customers for a wide range of applications. The Hikvision alarm solutions demonstrated the full range of products and technologies available and how they can all be utilised together –covering any security need – all from one provider. Intrusion and video verification “We had a great show with lots of interest across our wide variety of products, with the new range of alarm solutions from Hikvision generating significant interest. This range makes a real statement as a total solution, providing a new and innovative approach to intrusion and video verification,” said Marc van der Putten, Product Marketer. He continues, “Security Essen is one of the foremost trade fairs for security and our 400 square-metre stand made a great impression with customers, both new and existing.” “We wanted to create a story of how our customers can utilise Hikvision products across a range of different applications. This also demonstrates how our technology and extensive portfolio adds value to our customers’ businesses through seamless operation and deep integration across different aspects of security, like intruder and CCTV.” Hik-Connect smart device application The alarm area of the stand included the latest version of the multi-award-winning Pyronix Enforcer, featuring its highly-acclaimed redesigned housing, as well as the new wired keypad. There was also the latest security offering from Hikvision, the AXHub, which operates with Hikvision and ONVIF cameras utilising the Hik-Connect smart device application. Along with alarm solutions, Hikvision video surveillance, drones, access control, and much more were also showcased at the stand, reinforcing both the scale and capability of comprehensive security solutions Hikvision offers.
The ZMR6442AX-P IP dome camera from LILIN serves as a first line of defense for stores, homes, offices and hotels when monitoring suspicious activity indoors and outdoors. With its 4MP video resolution, IR LED long-distance illumination, and P-IRIS support, the ZMR6442AX-P ensures around-the-clock safety and security. The ZMR6442AX-P achieves 2688 (H) x 1520 (V) resolution or roughly thirty percent more area coverage than an 1080p HD camera to help reduce the required number of cameras installed. Significantly higher resolution, combined with a 2.8-12mm motorised auto-focus lens, means the ZMR6442AX-P can be adjusted to cover both a wide field-of-view or a smaller area for zoomed-in forensic detail. Day/Night sensor technology P-Iris allows the camera to perform in diverse lighting conditions by delivering better depth of field Because night time surveillance is crucial to any security program, the ZMR6442AX-P is also outfitted with a high-efficiency IR LED that enable it to capture images up to 30 meters away in the complete absence of light. Night vision is further enhanced by Day/Night sensor technology that converts blurry color images into crisp black and white video when monitoring in darkness. P-Iris allows the camera to perform in diverse lighting conditions by delivering better depth of field, preventing the blurred video that can occur when an auto iris overcorrects for bright lights. Versatile as it is powerful, the ZMR6442AX-P can record video using different codecs: True H.264 AVC High Profile video compression, Smart H.264 or Motion JPEG for maximum network efficiency. Improved compression allows for faster, more fluid remote viewing, along with the ability to view more channels remotely. Rugged performance and vandal resistance The ZMR6442AX-P was environmentally engineered with an IP66-certified housingStandard cameras cannot be deployed outdoors without damage occurring to their sensitive internal networking components. However, the ZMR6442AX-P was environmentally engineered with an IP66-certified housing that protects it from rain and snow. It's operating range of -40° to 122° F qualifies it for reliable installation in outdoor spaces subject to wide temperature swings. In addition, the camera is IK10-rated vandal resistant. This rating is critical when cameras are located where they can be physically breached such as in schools or prisons. To maximise vandal resistance, the ZMR6442AX-P features a rugged polycarbonate dome cover that can withstand a powerful blow from a baseball bat. Labor costs play a major role in determining a dealer's profitability in a video surveillance job. To minimise time the dealer has to spend on install, the ZMR6442AX-P offers flexible mounting, one-push auto focus, Power over Ethernet (PoE), and seamless compatibility with LILIN and third-party ONVIF compliant hardware.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF physical security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardisation organisations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 compression formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognises the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
It's no secret that one of the next market segments to see exceptional growth in the United States is somewhat non-traditional: cannabis. The global cannabis market is projected to reach $60 billion by 2024, according to Ameri Research, fueled by the increasing legalisation and decriminalisation across much of the United States. It is estimated that 22 million pounds of marijuana are grown each year in the United States, with 80 percent coming from California, Tennessee, Kentucky, Hawaii and Washington, according to Mother Jones. Unlike other products, this commodity is valuable from the moment the seeds go in the ground to the exchanging of money for end-user products - and at every point in between. Within large greenhouses, 360-degree cameras that show a wide field of view are essential for cannabis protection From seedlings to selling, securing every point within the supply chain is vital to the assets being distributed, and companies are now realising how lucrative this endeavour can be. Critical to the success of the industry is keeping the merchandise secure and the workers safe. In this article, we explore each part of the supply chain within the cannabis market and address ways of implementing robust security measures. Plants, fields and greenhouses This is one industry where money actually grows on trees! When cannabis crops are planted either in greenhouses or in fields, security becomes critical, since the plants themselves are worth a significant amount of money. A single truckload can be worth hundreds of thousands of dollars, so securing the load is crucial to the process Producers don't want plants stolen – especially high-end varieties that garner a bigger profit when harvested and sold – and the size of the plants make theft a greater possibility. Video surveillance becomes vital at this point and can be used in a variety of ways. Within large greenhouses, single cameras that can cover a wide expanse of space, such as cameras that offer 360-degree views, are essential and can provide more coverage with less investment overall than traditional narrow field-of-view cameras. Advanced technology, such as unmanned aerial vehicles (or drones), are also being used in open fields in an effort to protect these plants. Comprehensive video surveillance becomes the main tool for thwarting cannabis theft and addressing incidents as they arise Transportation and protection Once the plants are mature enough to be harvested, they must be transported to a production facility where they are either dried or cured based on the needs of the grower, as well as processed and transformed into edible products to be sold at retail locations. There are already a range of companies that specialise in keeping these crop yields safe while they are transported: think Brinks armoured transportation used for cash, but for cannabis. A single truckload can be worth hundreds of thousands of dollars – if not more – so securing the load is crucial to the process. Losing one of these loads can lead to large-scale losses for a producer. Surveillance equipment that can withstand sanitation standards and power-washing is paramount for effective protection After being transported, cannabis must be processed. In these environments, where strict handling processes are in place, surveillance equipment that can withstand sanitation standards and power-washing is paramount. This requires camera enclosures that are rated for resistance to high-pressure water jets, dust and vandalism/tampering. Since edible processing requires stringent regulations be followed, it becomes more critical for security managers to identify solutions that carry the NSF Mark, making them compliant with standards set forth for commercial food equipment in North America, or the HCV EU, the equivalent in Europe. Many of these locations handle and store large amounts of cash since customers have to pay with cash Retail protection As the final products come out of processing and go into storefronts to be sold by retailers in States that have recreational or medical facilities, there's another level of security that must be in place to protect these transactions. But careful considerations must be made. Traditional security tags cannot generally be used because of the small size of many of the end products, making it more difficult to track with tracking devices.Traditional security tags cannot generally be used because of the small size of many of the end products In this instance, comprehensive video surveillance becomes the main tool for thwarting theft and addressing incidents as they arise. In these locations, a loss prevention or security officer has to be an integral part of the team. Another consideration is the careful screening of the potential employees. Since the federal government doesn't recognise cannabis producers and retailers, banks that are federally insured through the FDIC don't accept money from these establishments, meaning that many of these locations handle and store large amounts of cash since customers have to pay with cash. There must be security measures in place for these kinds of transactions, including the ability for video surveillance to be played back instantaneously in the event of an incident at a cash register. The cannabis market comes with a variety of challenges at each and every step of the operation, from growing to transport to production and sales. Video surveillance and business intelligence solutions are ideal for these applications, and as the market grows, more and more security companies will look to cater to the market.
Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages of mobile surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command centre. This allows the first responders in the pursuit vehicle to focus on minimising risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilise additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 mobile video compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command centre. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted video transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command centre? It is not untypical for a police force to have an existing video management system (VMS) at their command centre such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favourite choice with many companies and government agencies.
IFSEC International 2018 kicked off last week at London’s ExCel Centre. Visitors were lucky enough to experience a rare three days of British sunshine as they came together to discuss the latest trends and technologies in the physical security industry. Many exhibitors commented on how the show seemed smaller than previous years, with stands more spread out, and fewer ‘double-decker’ offerings than earlier shows. Although exhibitors represented all aspects of physical security, including access control and intrusion detection, the show was largely dominated by video surveillance. Video manufacturers Avigilon and Dahua were key sponsors, while the largest stand by far was occupied by Hikvision. Rather than hosting large product portfolios, exhibitors chose to demonstrate how integrated solutions could provide a more holistic solution If stands seemed more modest than in previous years, this may be a reflection of the industry shifting away from its long-standing product focus. Displaying large product portfolios takes more exhibit space. In an increasingly commoditised market, security integrators are combatting price erosion by emphasising holistic solutions rather than products and features. While some manufacturers have responded by collaborating with partners to offer a broader portfolio of solutions, others have invested in building end-to-end systems. Both these trends were reflected at the show; rather than hosting large product portfolios with a wide range of features, exhibitors chose to demonstrate how integrated solutions could provide a more holistic solution to end users’ challenges. Integrated systems approach One manufacturer opting for a solutions focus was security, access control and door entry systems provider STANLEY Product and Technology. The stand was represented by a range of STANLEY brands including PACOM and PAC GDX, as well as technology from recent acquisition 3xLOGIC. The PACOM team was on hand to demonstrate integrations of PACOM’s Graphical Management System (GMS) with workflow management software from RightCrowd, and biometric authentication products from EyeLock. PACOM Systems’ Commercial Director Gary Rowden explained that the stand was designed specifically to showcase all of STANLEY’s brands and partners in one place, encouraging customers to buy into the STANLEY solutions approach, rather than focusing on specific products. The show was largely dominated by video surveillance, with video manufacturer Avigilon a key sponsor Connecting with partners Another company emphasising partner solutions was Milestone Systems. Milestone’s Vice President for EMEA, Malou Mousten Dyhr Toft, who joined the company in March, explained how IFSEC International continues to be a key show. It was an opportunity to meet with Milestone’s expansive community of existing partners, as well as connecting with new partners and end users. Milestone hopes to enable community customers to process more video data with fewer servers, increasing scalabilityIn February this year, the company launched the Milestone System Builder initiative, allowing partners to optimise their hardware to pre-load Milestone’s XProtect VMS software. Several system builder partners were present at the Milestone stand. By collaborating with NVIDIA, Milestone hopes to enable community customers to process more video data with fewer servers, increasing scalability and reducing the total cost of ownership of its partner solutions. The stand showcased Milestone’s latest XProtect 2018 R2 VMS that leverages NVIDIA’s high-powered graphics processing units (GPUs), which can handle up to 2,000 video streams on one single server. Commitment to open systems MOBOTIX took this year’s IFSEC International as an opportunity to spread the word about its increased commitment to open systems. Since the company’s majority acquisition by Konica Minolta in 2016, and the subsequent addition of CEO Thomas Lausten last year, the company has undergone a significant change in approach, all-the-while guarding its core decentralised IP video product offering and made-in-Germany DNA. Lausten was previously a key figure at Milestone Systems and has brought to MOBOTIX a new approach focused on collaboration. Partners present at the MOBOTIX stand included Milestone, Kentix and Wavestore. The company also demonstrated its commitment to open systems by unveiling MOBOTIX MOVE, the manufacturer’s first line of ONVIF G compliant cameras. Visitors were lucky enough to experience a rare three days of British sunshine at IFSEC International this year Security system provider Vanderbilt had many new developments on show, including integrations both within Vanderbilt systems and with partner systems. The company’s SPC intrusion detection system now integrates with Milestone software, allowing SPC users to trigger events and control alarm systems from within the Milestone platform. A further highlight was Vanderbilt’s ACTEnterprise access control system, which now integrates with ASSA ABLOY’s Aperio wireless locking solution. Vanderbilt hopes that the integration will provide customers with faster, more cost-effective access control installations.Vanderbilt hopes that the integration will provide customers with faster, more cost-effective access control installations Reducing costs, increasing ease-of-use Many exhibitors were keen to demonstrate how integrated solutions could reduce costs for integrators by unifying systems on one easy-to-use platform. Arecont Vision unveiled its new Contera cloud-based video management solution at ISC West in April, making IFSEC the technology’s first outing in the European market. Contera is Arecont’s first video management offering and will allow customers to benefit from end-to-end solutions from the US-based company. Since the Contera system is designed to be web-based from the start, integrators will not be faced with the additional cost of adapting a legacy VMS system to the cloud. IDIS was another manufacturer highlighting their enhanced user experience and reduced cost offered by end-to-end systems. Visitors experienced demonstrations of the IDIS Center video management software, which is designed to offer smart user experience controls, and a user-friendly interface. Also on display were the company’s latest ranges of analogue and IP cameras. The IDIS system allows users to ‘mix-and-match’ HD analogue and IP video depending on the requirements of the project, with all surveillance operated from the same IDIS software interface. The mix-and-match approach avoids the additional cost of unnecessarily ripping and replacing legacy analogue systems. IFSEC 2018 presented a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in an increasingly challenging market, without losing sight of the most pressing needs of end users and integrators.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Cybersecurity is a growing concern for manufacturers of life safety and security products, and Underwriters Laboratories (UL) wants to help solve the problem. Specifically, UL seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity “hygiene.” UL cybersecurity certification UL is a familiar brand in consumer goods and in the security and life safety markets. UL certification is sought by manufacturers in a range of product lines, from electrical goods and smoke alarms to access control and central monitoring stations. Approximately 22 billion UL marks appeared on products in 2016. In the physical security industry alone, products are certified to around 20 different standards covering access control, intrusion detection, locks, safes and vaults, software and other categories. Now UL is working to increase the prominence of their brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers General Requirements for Software Cybersecurity for Network-Connectable Products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/Life Safety & Security industry, was published in September 2017. Testing for cybersecurity weaknesses The UL 2900 standard encompasses three main areas related to cybersecurity – software weaknesses, known vulnerabilities and risk control such as encryption, access control, passwords, remote communications, and software patches and updates. UL conducts structured penetration, fuzz testing and other tests to establish a reasonable level of confidence that a product or system has addressed cybersecurity concerns. “Certification to the standard means that a product or system has been evaluated to a minimum level of cyber hygiene,” says Neil Lakomiak, Director of Business Development and Innovation, Building and Life Safety Technologies, for UL LLC. “It covers the ‘blocking and tackling’ that you would expect manufacturers to do. It doesn’t provide absolute assurance, but rather a level of confidence that a product has been vetted.” The certification is good for one year, and changes in products require recertification. UL has written more than 1,600 standards defining safety, security, quality and sustainability Lakomiak says applying the standard will: “create an environment where companies are starting to incorporate cybersecurity into their development processes; creating security by design. It will elevate the industry to consider cybersecurity earlier in the development process.” An overall goal of UL is to “give people peace of mind around the products and systems they use.” Underwriters Laboratories at ASIS 2017 Companies that achieve certification can promote it as a point of differentiation in the market, although not a guarantee that a product is cybersecure. UL’s independent evaluations carry weight in the market, as reflected by the ubiquity of the UL brand, and Lakomiak contends the industry can benefit from applying the same level of testing and certification to the area of cybersecurity. He sees UL’s cybersecurity initiative as complementary to other cybersecurity measures, such as “white hat” hacking. From a standards perspective, UL’s efforts seek to complement industry efforts such as SIA, ASIS International, PSA and ONVIF. Lakomiak was at the ASIS 2017 show in Dallas, where he met with existing manufacturer customers and potential future clients – including large and small companies in the industry – to discuss cybersecurity and the road to certification. He says many manufacturers are not yet ready for certification, in which case UL provides consultancy and advisory services to help them get there. “A lot of companies just need help understanding what their current processes and cybersecurity posture are,” says Lakomiak. “They want help to create a roadmap to get certification. A variety of manufacturers are on the path to certification.” Underwriters Laboratories security mission The cybersecurity element is an extension of UL’s mission to help companies demonstrate safety, confirm compliance, deliver quality and performance, and build excellence. Lakomiak says many people mistakenly perceive UL as a quasi-governmental organisation, perhaps because UL standards are sometimes incorporated into regulations. However, the organisation is a business and wants to operate like one by serving the needs of its manufacturer customers. “We want to have the service we provide be market-driven. We understand the pain points of manufacturers, integrators and others as they interface with technology. We want to devise programmes to help them be successful in the market. Our focus is to make our customers succeed by providing objective certification.” To the extent that cybersecurity is a growing pain point for the physical security industry, there is a large potential role to be played by UL and many others.
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-site CCTV surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Centre, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Centre, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defence Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defence. High-definition video security to secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfil the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedised Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analogue and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analogue systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP video streaming networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminium and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical relationship with 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centres via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-speed fibre-optic connectivity High-speed fibre-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
An integrated surveillance and security management solution, developed and deployed by Synectics, is helping to improve staff and inmate safety at a major European Category A prison. The vast site, which houses over 750 inmates, comprises multiple buildings, including cell blocks, visiting zones, gym and exercise areas, and special focus zones, all of which are monitored by over 2000 cameras. A command and control solution was required that would allow operators to monitor and manage all cameras from a single location – the ECR (Emergency Control Room). The solution had to be capable of integrating with a wide range of third-party access control, security, and emergency systems operating across the prison estate that are designed to flag up staff and inmate safety risks – a key priority for the prison authority.Synergy 3 is designed to integrate with a wide range of ONVIF-conformant systems and devices Multi-site monitoring The end-to-end Synergy 3-driven solution developed by Synectics gives security personnel located in each block 24/7 access to video footage and ensures that overarching control is only allowed by operators based in the central ECR. Here, footage from any camera located in any block is monitored, controlled, and reviewed in real time, with integrated GIS mapping displaying camera points, additional location-based data and live ‘field of view’ plotting on an exact site layout. Operators can simply point and click to immediately view live feed and control PTZ cameras directly from the map. Synergy 3 is designed to integrate with a wide range of ONVIF-conformant systems and devices. Hence, video footage can be paired with data inputs from other third-party systems to provide the prison with a comprehensive alarm monitoring and alert solution. Threat detection with body-worn alerts By connecting data from the access control system and information from body-worn emergency alerts, Synergy 3 can immediately flag up the location of a staff member and display footage from the nearest camera, allowing operators to undertake a visual assessment of any potential threat. The map-centric display, teamed with alert-triggered on-screen guidance workflows, ensures that the right support is dispatched to the correct location as quickly as possible.Synergy 3 removes the need to allocate specific blocks/areas to supporting inmates in need of help GIS mapping The GIS mapping capabilities of Synergy 3 also facilitates the prison’s ‘safer cells’ initiative that changes the level of support and monitoring assigned to an individual cell based on the inmate’s risk level. For example, if an inmate is suffering from mental health issues, they may require more frequent staff contact, observation, or in severe cases be assigned to suicide watch. Using Synergy 3, operators in the ECR can monitor any designated ‘safer cells’ and therefore activate/de-activate associated systems including in-cell surveillance, pill-hatch status, and audio logging of conversations with prison staff and from audio call points implemented in partnership with the Samaritans. In addition to supporting those inmates most in need of help, using Synergy 3 to activate safer cell features removes the need to allocate specific blocks/areas of the prison to this purpose, thus reducing situations where vulnerable prisoners might feel even more isolated. Emergency response through interoperability Synergy 3’s interoperability with other systems enables operators based in the ECR to engage precise emergency protocols should a threat be detected. For example, individual doors or whole zones can be locked down for incident containment. Conversely, should the need arise to evacuate a particular area quickly, access control can be overridden to create the fastest route to safety. Synergy 3's workflow feature also enables lights and power to be controlled in response to evolving scenarios, such as disabling lifts in the event a fire or if a hazard has been detected on a specific floor.With built-in redundancy functionality, coverage at the prison is guaranteed 24/7 360-degree surveillance While enhanced safety was an essential priority for the project, the Category A status of the facility requires the highest levels of security functionality from the surveillance solution supplied. By integrating and interrogating data from a wide range of systems, the Synergy 3 solution from Synectics delivers a 360-degree view of all site movement, activity, and alarms for complete situational awareness. For example, integration with the perimeter fence solution and video analytics generates alerts based on movement, touch, and approaching shapes for immediate review and action. And with built-in redundancy functionality, including server failover and hot-swap recording to eliminate any single points of failure, coverage at the prison is guaranteed 24/7. Together with Synergy 3’s operational and safety management capabilities, these features all help ensure that inmates, personnel, and facilities across the prison estate are supported and protected. Brett Longley, Technical Sales Manager at Synectics, said: “Prison facilities are no longer just about traditional security. This project demonstrates that a fully integrated surveillance solution delivers a wide range of safety measures benefiting inmates and staff and helps improve overall operational efficacy.”
Fifth Third Bancorp, one of the top 15 banks in the U.S., is well on its way toward completing a major upgrade of its March Networks video surveillance system. A customer since 2004, Fifth Third has deployed 12,000 March Networks cameras and approximately 1,400 March Networks 8000 Series Hybrid NVRs over a period of 36 months. Identification and apprehension of suspects “By the end of 2016, we’ll have a total of 1,600 new 8000 Series recorders,” said Mike Neugebauer, Fifth Third’s Vice-President and Director of Corporate Security, who oversees security for 1,300 full-service retail branches, as well as data centres, corporate offices and cash handling facilities across 12 states. The combination of March Networks MegaPX WDR MiniDome Z IP cameras, Analog WDR Indoor Domes and the 8000 Series Hybrid NVRs with advanced video compression allows Fifth Third to provide law enforcement authorities with high-quality video for the identification and apprehension of suspects. Video verification improves urgency “Bank robberies and break-ins appear to be trending higher nationally,” said Neugebauer. “Much of it is a consequence of the heroin epidemic. Typically, they’ll go through a window in the middle of the night to see what there is to steal.Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see" “We constantly get compliments from law enforcement about the quality of our video. Even if the bad guys show up with hoodies or masks, we can zoom in on clothing patterns and brand logos, partial facial features, tattoos or other distinguishing marks.” “Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see,” said Neugebauer. “Video verification is huge. It changes law enforcement’s urgency to respond.” Crystal-clear images In minutes, Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension. The March Networks MegaPX WDR MiniDome Z IP camera’s wide dynamic range and progressive scan in high resolution delivers excellent image quality even in bright backlit situations, while its H.264 compression technology reduces bandwidth and storage costs. The MiniDome Z also features Power-over-Ethernet and is ONVIF-compliant, allowing it to be used with a variety of third-party video surveillance systems. Linking video with teller and ATM transaction data allows fraud investigators to quickly establish the identity of an individual associated with a transaction The Analog WDR Indoor Dome also features wide dynamic range, progressive scan in high resolution and low light sensitivity, making it ideal for capturing quality images in a variety of lighting conditions. Mix of analogue and IP The 8000 Series Hybrid recorder is a perfect fit for Fifth Third, accommodating a mix of analogue and IP cameras and offering up to 16 TB of onboard storage across four hard drive slots. “Typically, we’ll have two IP MiniDomes and 14 analogue cameras per branch, but we’re starting to use more exterior-mounted IP cameras in our elevated risk branches, so storage is important to us,” said Neugebauer. “The other thing we like about the 8000 Series is how it gives us sharper images from our analogue cameras.” The availability of the 8000 Series Hybrid NVR in 4, 8, 16 and 32-channel configurations is also a plus because it allows Fifth Third to acquire a fit-for-purpose unit for every application. Compatibility issues The decision to standardise on March Networks cameras frees Fifth Third from having to worry about any compatibility issues. “When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us,” said Neugebauer. “That was especially the case for IP megapixel cameras and managing the software patches that have to go on them. The fact that our March Networks cameras work in concert with our NVRs means we don’t have to do any software loads like we had to do when we were buying another camera brand. We were managing many pieces of software instead of just one platform.” Transitioning to Command Enterprise and Searchlight Next on the agenda for Fifth Third is a transition to March Networks Command Enterprise video management software and the acquisition of March Networks’ Searchlight for Banking software. Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension Command Enterprise features a user-friendly, browser-based interface that provides support for up to 10,000 recorders and 128,000 video channels, while Searchlight for Banking is a suite of tools to speed fraud investigations and capture business intelligence such as tracking customer behaviour. Linking video with teller and ATM transaction data, for example, allows fraud investigators to quickly establish the identity of an individual associated with a transaction. Searchlight advantages “On the retail side, we also hope to take advantage of Searchlight to help us make better business decisions,” said Neugebauer. Using Searchlight’s queue length monitoring analytics, Fifth Third will be able to gather and compare metrics on branch traffic and speed of service. It can also be used to track self-serve kiosk usage and gather data on how long customers linger in front of marketing displays. Concurrent with the introduction of Searchlight, Fifth Third is also planning to acquire March Networks’ new MegaPX Indoor Analytics Dome camera with built-in intelligence. “We’ve just done some testing and we’re very pleased with it,” said Neugebauer. While security remains the primary application for video surveillance at Fifth Third, other “lines of business” are taking advantage of it. Weather damage and alarms “In the past, security directors were always hesitant to share their video surveillance system, but we share our system with our facilities and retail groups”, said Neugebauer. “They use it to see if the sidewalk has been shovelled or if the parking lot has been plowed in our northern branches. In Florida, where we’ve had some severe storms, they use it to see if the windows have been blown out or if we have water damage. “Our facilities group has really embraced it. We’ll put cameras in mechanical rooms, for example, so they can see the indicator light configurations on the control panels. It often saves them from making a trip to the site. If a technician gets an alarm from an HVAC system or a generator, for example, he can diagnose the problem remotely and take the necessary steps to resolve it.When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us" “Retail uses the system to look at compliance with opening and closing procedures. Or, they may have a teller who’s great at selling and go in to look at best practices for training purposes.Sharing their March Networks video surveillance system with other departments “makes funding easier for us,” said Neugebauer. Longer lifecycle However, underlying Fifth Third’s choice of a video surveillance supplier is March Networks’ track record for product durability. Fifth Third began retiring the 4000 C Series recorders it acquired in 2004 two years ago and will only complete the transition to new 8000 Series units in 2016. “Some of my peers in the industry are buying new recorders every three years,” said Neugebauer. “Everything has a lifecycle and we feel the lifecycle for March Networks products is significantly longer than most of the other systems out there.”
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organisation that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal is to deliver global standards of excellence in technical education for all its students. Looking to provide a more secure environment and enhance education management, both inside its college campuses and within classrooms, DTE enlisted the help of Prama Hikvision India to evaluate their needs and recommend a practical solution. Enhancing education processes Working closely with the client, Hikvision undertook site surveys at 43 campuses across Gujarat and in respect of DTE’s management and system performance needs, proposed a cost-effective solution that would provide the required level of indoor and outdoor surveillance coverage. The considerations for the surveillance solution would also take-in DTE’s objective of enlisting the new system to play a role in enhancing the day-to-day education processes, where it could also be used to remotely monitor examinations, as well as being a time-saving facilities management tool for use across the large Western India state.The Hikvision control software fully supports smart search, playback, and smart detection Centralised surveillance monitoring Providing centralised remote surveillance and alarm monitoring, Hikvision proposed an IP-based solution that would use DTE’s existing secure virtual private network (VPN), which connects all education sites across Gujarat to a central point at the Directorate of Technical Education, in the capital city of Gandhinagar, Gujarat. At two control rooms, Hikvision iVMS-5200 Professional VMS software was installed to control and monitor the new surveillance system 24/7. Ideal for controlling any mix of surveillance system products, the iVMS-5200 Professional software fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as any mix of third party manufacturer products that conform to ONVIF standard. Allowing DTE’s security and management application needs to be addressed, regardless of its size and complexity, the Hikvision control software fully supports the installed Hikvision products’ smart features, including smart search, playback, and smart detection. Low-light surveillance capability To provide affordable high-quality surveillance imaging across the 43 college campuses covered, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true day and night (ICR) low-light capabilities, along with back-light compensation (BLC). Approximately 1,300 Hikvision cameras installed now provide comprehensive surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and open campus area access gates and car parks. Integrated campus security The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably"The Hikvision IP-based surveillance solution successfully illustrates just what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably, encompassing central video management, integration and failover mechanism." "Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR mode, there is no need for an intermediate storage server, which not only increases storage efficiency and system stability, but also greatly reduces system hardware cost for the end-user.” Remote surveillance DTE system operators can remotely check the status of facilities or presence/absence of support staff "The Hikvision video surveillance system utilises a WAN/VPN to connect each of the separate locations in this massive multi-site project,” explains Mr. Dayashankar of Progility Technologies Pvt. Ltd., systems integration company responsible for the installation of the project. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate the many existing third-party manufacturers cameras into the new system, as well as providing out of office hours remote alarm configuration and monitoring. We found the quality of the Hikvision networked camera images to be exceptional under every operating condition.” Viewed from the central monitoring stations, DTE system operators can now remotely check the status of facilities or presence/absence of support staff across Western India. In addition, on examination of the high definition play back, since the installation went live, incidents of petty theft have been recorded, and stolen belongings of students and facilities recovered.
Hikvision, the global supplier of innovative video surveillance products and solutions, has supplied VMS software and IP products for the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities across Western India. Remote surveillance and alarm monitoring Providing remote surveillance and alarm monitoring, Hikvision proposed an IP solution using DTE’s secure VPN, which connects all the education sites. Fully supporting Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as third party manufacturers’ products conforming to ONVIF standard, Hikvision iVMS-5200 Professional VMS software was installed to control the new surveillance system 24/7. Providing affordable high-quality surveillance imaging across the 43 campuses, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true Day & Night (ICR) low-light capabilities, along with Back-Light Compensation (BLC). Approximately 1,300 new Hikvision cameras now provide surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and access gates and car parks. The Hikvision IP based surveillance solution illustrates what can be achieved with large-scale integration" IP based surveillance solution "The Hikvision IP based surveillance solution illustrates what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 VMS software enables 43 campuses to be monitored easily and reliably, encompassing central video management, integration and failover mechanism. Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR there is no need for an intermediate storage server, which increases storage efficiency and system stability, whilst greatly reducing hardware costs.” "The Hikvision surveillance system utilises a WAN/VPN to connect the locations in this massive multi-site project,” explains Mr. Dayashankar of systems integration company, Progility Technologies Pvt. Ltd. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate existing third-party cameras, as well as providing remote alarm configuration and monitoring. The quality of the Hikvision camera images is exceptional under every operating condition.”
ONVIF, the global standardisation initiative for IP-based physical security products, announces that Highways England has adopted an ONVIF – centric open standards approach to video technology for the continued expansion and management of its national highway CCTV and traffic system. The use of an open, standards-based CCTV system allows the national transport organisation to support existing CCTV cameras while providing a pathway for adding new, ONVIF Profile S conformant cameras from a variety of different vendors to the system. Highways England sought a standards-based approach for its CCTV and traffic system, which oversees motorways and major roads in England, in order to maximise the value of its bespoke CCTV cameras and to help keep tax payer-funded expenditures as low as possible. In addition to enabling continued control of existing CCTV assets and an incremental migration from legacy analogue to IP, a standards-based approach offers Highways England the ability to use new innovative CCTV technology as it appears in the general market. As part of the ONVIF-centric, open standards approach, Highways England will specify that any new cameras added to the CCTV system must be conformant to ONVIF Profile S, whilst recording shall conform to ONVIF Profile G. Open standards for physical security “Government entities and municipal councils are increasingly choosing to base their physical security infrastructure on open standards, like those established by ONVIF, in order to maintain a CCTV system that is vendor-neutral, flexible and future-proof,” said Jason Moss, Technical Director of Intelligent Transport for Mouchel, the consulting group assisting Highways England with its CCTV system. “This approach allows Highways England with help from its system integrator Costain to migrate to an open standards-based system incrementally as bespoke cameras reach their end of life and are replaced with ONVIF Profile S-conformant models from different vendors with use-appropriate feature sets.” Highways England and two other major stakeholders are also joining forces with ONVIF to establish standard interfaces that can be used to allow users of their legacy and future CCTV systems to safely and securely access each other’s images. This will provide a truly open standards-based approach and provide flexibility in vendor selection to Highways England operations for the future. Working closely with end user “This collaboration with Highways England is a valuable one because we are given the opportunity to work closely with an end user who is solving a very real problem shared by many organisations – the need to modernise their CCTV infrastructure without replacing their entire system," said Per Björkdahl, Chair of the ONVIF Steering Committee. “An added benefit of the collaboration is that Costain has become an ONVIF member and will bring a valuable perspective to the work of ONVIF in the future.” Founded in 2008, ONVIF is a leading and well-recognised industry forum driving interoperability for IP-based physical security products. The organisation has a global member base of established camera, video management system and access control companies and more than 7,000 Profile conformant products. With Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality and the Release Candidate Profile A for access control configuration, ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.