PTZ cameras
Matrix successfully showcased its advanced security products and solutions at the 5th edition of the Rail and Metro Technology Conclave, held at Hotel Le Méridien, in New Delhi, India, from July 23-24, 2024. As the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways, Matrix highlighted its STQC-certified network cameras, adhering to the OWASP ASVS 4.0 L2 standards for cybersecurity compliance. These cameras ensure that critical passenger video data remain...
RecFaces, a provider of advanced facial biometric software, announces the release of its new white paper titled - 'Facial Recognition Systems in Securing Critical Infrastructure'. The white paper delves into the fundamentals of securing critical infrastructure, which encompasses everything, from perimeter monitoring and access control to video surveillance and beyond. Facial recognition technology With increasing digitisation, the Internet of Things, and biometric technology advan...
Hikvision, a manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to introduce the new 4 MP DeepinView Varifocal Bullet Camera, a cutting-edge addition to its product lineup. DeepinView Varifocal Bullet Camera This innovative camera is packed with functionality, featuring 10 switchable AI functions including Road Traffic and Vehicle Detection capabilities, making it an essential tool for modern surveil...
Invixium, a global major in biometric access control, workforce, and visitor management solutions, proudly announces its acquisition of US-based Triax Technologies (Triax). This strategic acquisition expands Invixium’s portfolio with Triax’s AI-based RTLS (Real-Time Location Systems) and connected worker solutions, designed to improve worker productivity and equipment utilisation. With this move, Invixium broadens its scope beyond entry-point access control to address the complex d...
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced the next-generation embedded software for the ITAR-free Boson+ thermal camera module, delivering high-performing uncooled thermal imaging technology for defence, firefighting, automotive, security, and surveillance applications. Featuring industry-renowned thermal sensitivity of ≤20 mK, Boson+ has been upgraded to provide even sharper thermal imagery and improved spatial filtering. Continuously improved thermal pe...
Panasonic Marketing Middle East & Africa (PMMAF) has announced the regional launch of its newest 4K PTZ Camera. Boosting the brand’s robust line-up of 4K integrated cameras is the AW-UE30 with 20x Optical Zoom and 74.1° wide-angle lens. With a compact design and built-in auto tracking feature, the AW-UE30 also supports easy and efficient operation making it ideal for use in academic settings and business meetings. New 4K Integrated PTZ Camera Mr. Fujio Hiramori, Manager - Market...
News
An industry pioneer in the application of radar technology for security surveillance, 360 Vision Technology, the UK manufacturer of rugged HD, hybrid, radar, and thermal imaging cameras, is at the forefront of cost-effective radar technology suitable for a broad spectrum of high-security monitoring applications. Radar technology is often thought to be exclusive to the realms of high-budget security installations. However, spearheading the latest developments in cost-effective combined radar, surveillance camera, and analytics technology, means that now, the benefits provided by highly effective radar wide-area detection can be considered for a broader range of security surveillance applications. Radar technology “Traditionally, the use of radar systems has been considered to be the preserve of high-end installations, such as those at airports or ports,” says Tony Holloway, Business Development Manager at 360 Vision Technology. “However, using 360 Vision Technology Predator Radar all-in-one devices, with integrated 360-degree rotational radar and integrated high-definition PTZ camera(s), any open area can be secured, using a single, or for coverage of very large open areas, multiple radar devices." Predator Radar "Versus deploying many traditional thermal or infrared cameras, Predator Radar could prove a far more effective and economical solution to cover the same area." "In addition, Predator Radar’s advanced detection capability is such that target detection and alarm functionality are continuous, day and night, even within adverse weather conditions.” ‘Radio Detection and Ranging’ technology “Radar, or to be precise, ‘Radio Detection and Ranging’ technology, employs low energy radio frequency waves which are emitted and reflected off objects." "360 Vision’s radar technology uses advanced built-in software to measure the time it takes for the radio energy to be reflected and returned, in this way, the radar device can instantly calculate the precise distance and position of any number of targets across a 360-degree area of coverage, as scanned by the radar on its constantly rotating axis." Video analytics "Video analytics can then qualify the detected objects as being human or otherwise providing an enhanced level of potential threat detection. On detection of a target or targets, Predator Radar instructs its integrated Predator PTZ camera, or cameras, to view the targets and provide instant visual verification." "Additionally, as the targets move, they are automatically continuously tracked by the camera(s) to maintain real-time visual coverage.” Powerful, accurate, object detection Up to four tracking PTZ surveillance cameras can be integrated with one single radar unit Up to four tracking PTZ surveillance cameras can be integrated with one single radar unit. The configuration of the cameras is flexible, with either one camera built-in to the radar device, with three further external cameras integrated for tracking, or two cameras physically integrated with the radar device, synced with up to two external cameras. This continuous scene analysis provides operators with powerful, accurate, object detection, and is combined with notifications via real-time webpage-based live radar display, TCP/IP serial data/event messaging plus local or IP remote physical alarm contact outputs, providing a range of detection integrations, in addition to the ONVIF protocol for Video and Control integration. Radar vs alternative technologies When considering the use of radar vs alternative technologies, there are many factors other than purchase price alone to consider, these will include reliable performance, total cost of installation, and cost of ownership. It’s important to consider that effective target identification is critical to high-security systems covering large areas and that traditional detection methods, such as fence line detectors or camera analytics software alone, may fail to identify an object accurately enough. This will lead to false alarms and operators being alerted needlessly, leading to an ineffective increase in workload for each member of the security team in the control room. 360-degree surveillance Predator Radar units can scan vast areas, equivalent to 125,000 square meters of coverage With its 360-degree surveillance capability, Predator Radar units can scan vast areas, equivalent to 125,000 square meters of coverage. Although it is possible to cover large areas with traditional CCTV cameras, depending on the type of technology and implementation approach, far more video cameras will be required to cover the same area. Cost savings This has a direct impact on equipment, infrastructure, and installation costs, whereas a radar system covering the same area requires far less cabling, less power, less communication equipment, and less manpower to install. Therefore, the total cost of installation and long-term ownership can be substantially lower for a radar system, compared to that of a typical camera system, when compared to the smaller number of Predator Radar devices required. Effective threat detection Its analytics employ ‘Detect and follow’ functionality, no matter what the environmental conditions The combination of 360-degree radar detection and powerful analytics programming enables Predator Radar to detect objects through smoke, fog, and even adverse weather conditions, enabling the camera to be directed to targets, and its analytics to employ ‘Detect and follow’ functionality, no matter what the environmental conditions. “Using both radar and powerful analytics combined in one unit provides combined ‘double knock’ alarm verification, to provide the ultimate in alert accuracy for any application,” says Tony. All-in-one wide area PTZ camera “Predator Radar’s all-in-one wide area PTZ camera with sophisticated software analytics will identify targets and continue to track them." "This helps security surveillance operators to be alerted to a situation and identify precisely where the target is and where it is going, to provide the optimum level of incident information and evidential video.” Object verification Allied with video analytics, advanced machine learning means systems can learn to effectively ignore false alarms By applying the latest video analytics, once a target has been identified and tracked by the radar unit, targets can be instantly classified via camera analytical rules, such as automatically detecting and identifying intruders, vehicles, any object or person entering or exiting the frame, sabotage activity, loitering, object, and person appearance or disappearance, or any combination of those rules, providing even greater target identification and accuracy. Allied with this, advanced machine learning means systems can learn to effectively ignore false alarms, such as those created by foliage, animals, light cast, or adverse or heavy weather conditions. Applications of 360 radar Extending the core applications for radar surveillance, wherever an area needs to be secured for security or safety, 360 Radar can be deployed. Currently, traditional multi-camera solutions are being replaced by one single, simple-to-maintain radar unit, for applications such as large private houses, areas of natural beauty, stately homes, works compounds, and road infrastructure, including tunnels, where they effectively monitor traffic for stopped vehicle and accident detection. From the protection of national borders to utilities, commercial sites, business premises, critical national infrastructure, high-value estates, compounds, and events, 360 Vision Technology’s Predator Radar camera solutions are providing effective security, safety, and site management across the globe.
Automated operation is a key function for expanding rail capacity and strengthening the performance of railways. Working together with S-Bahn Berlin, Siemens Mobility has installed and will be testing an obstacle detection system – a key technology component for enabling fully automated driving – for the first time during regular daily operation. The project’s goal is to thoroughly evaluate the performance of the new obstacle detection system during daily operation in various weather and route conditions. The test data will be used to further refine the system and optimise the positioning of the detection sensors. Siemens’ new obstacle detection system In the future, the obstacle detection system can help drivers avoid accidents The system will record background data for the duration of the project, and neither the train drivers nor the passengers will notice its operation. In the future, the obstacle detection system can help drivers avoid accidents, which will stabilise daily S-Bahn operations and increase punctuality. The system promises to be a key technology for enabling digitalised, fully automated rail operations in the future. Albrecht Neumann, CEO Rolling Stock at Siemens Mobility, said: “Intelligent trains that relieve their drivers of routine tasks and support them in their work are the future of digitalised rail transport. These trains will be able to automatically set themselves up and shut down, ensure energy-optimised operation, react quickly and safely to obstacles on the track, and shunt fully automatically on the depot grounds.” Albrecht Neumann adds, “We look forward to working with our partners to qualify our innovative obstacle detection technology for practical application in Germany’s largest S-Bahn network.” Berlin S-Bahn Peter Buchner, CEO S-Bahn Berlin GmbH, said: “For 100 years, the Berlin S-Bahn has stood for innovation and progress. We are partnering with industry to test new technologies that support environmentally friendly rail transportation. Automatic obstacle detection will be an indispensable component for automated driving in the future. It is already capable of supporting our drivers and contributing to better operational quality.” Martin Fuchs, CEO Verkehrsverbund Berlin Brandenburg (VBB), said: “The states of Berlin and Brandenburg and the Berlin-Brandenburg public transport authority (VBB) support innovation and the groundwork needed to make S-Bahn operations more efficient and effective.” Automatic obstacle detection project Martin Fuchs adds, “This automatic obstacle detection project will generate valuable findings and enable us to further develop the S-Bahn system. Exactly 100 years after the S-Bahn was first electrified, we are preparing yet another technological leap that will make Berlin’s S-Bahn system fit for the future.” Testing of the technology will be carried out in a partnership between Siemens Mobility GmbH (installation supervision, sensors, hardware, software and digital map), S-Bahn Berlin GmbH (trains, installation, operation), and Digitale Schiene Deutschland/DB InfraGo (digital mapping, open data platform). Results of the tests will be evaluated together with the VBB. Sensors used include high-performance LiDARs On the technical side, the sensors used in the project will include high-performance LiDARs On the technical side, the sensors used in the project will include high-performance LiDARs for close- and long-range object detection and an infrared camera. The algorithms for evaluating the sensor data have been specially developed for the rail sector in the ‘Berlin Digital Rail Operations – BerDiBa’ research project by Siemens in Berlin-Adlershof and have already been optimised several times. The system continually compares the position of a train with the location of detected objects using a digital map. Decisions whether to warn the driver or brake the train are made on the basis of these ongoing calculations. A newly developed map from DB InfraGo, which depicts reality with centimetre-accurate precision in 3D, is being used for this purpose for the first time. Digital Rail Germany initiative As part of the Digital Rail Germany initiative, Siemens, a technology major in the field of rail automation, and Deutsche Bahn are pursuing a new approach to accelerate the introduction of this detection technology in the rail sector and promote innovation in Germany. In the project, selected data showing obstacles on the track will be made available centrally in anonymised form and can be used for research purposes, such as training AI models or for system validation. Emergency braking assistance system Following a one-year test phase through all seasons, the assistance system should be ready for use Following a one-year test phase through all seasons, the assistance system should be ready for use as an emergency braking assistance system that operates in the background to support the driver. On the basis of the data generated during this phase, it will be possible to use the system together with other automation components for automated driving at low speeds, such as during depot shunting or when deploying or shutting down a train. The field test aims to: Gain knowledge about boundary conditions for obstacle detection with the help of joint data evaluation, Record and evaluate the performance of the sensor technology under special operating conditions such as rain, fog, snow, and dirt, Minimise risks related to planning projects (technology, calculations, deadlines), and Optimise system settings to avoid false alarms, essential for driverless operation. Cooperation partners The cooperation partners - Siemens Mobility, Deutsche Bahn AG (S-Bahn Berlin GmbH, DB InfraGo, DB Systemtechnik) and the states of Berlin and Brandenburg with the Berlin/Brandenburg Transport Association will jointly analyse the findings and data from the project in the research project. Installation of a set of prototype sensors for detecting obstacles has already been completed in an S-Bahn Berlin train. As part of the field test, up to ten trains in the Berlin S-Bahn fleet will be equipped with the sensors. Once the field test has been completed, it is planned to remove the sensors.
An ideal manufacturing workshop features continuous monitoring of all machines and processes, offering a comprehensive view of the production line. This visualisation transforms complex data into easy-to-understand visuals, enabling quicker decision-making and proactive issue resolution. With full visibility, businesses can gain deeper insights into their operations, streamline processes, and enhance overall productivity. Production efficiency Here are three ways production line visualisation can significantly enhance production efficiency: 1. Efficient remote AR inspection Using video and AR technology, inspections are faster by streamlining equipment and production evaluations and eliminating time-consuming manual paper forms. An AR map simultaneously provides a comprehensive view of the entire workshop and specific details through picture-in-picture mode. Clicking on a specific point within the live feed reveals detailed information, enabling a more intuitive view and immediate issue responses, thus preventing disruptions. Proactive and seamless approach Moreover, the entire process is managed online, from scheduling to regular video inspections, with tasks promptly assigned to maintenance personnel. This ensures a proactive and seamless approach to monitoring, alarm handling, maintenance, and quality assurance. 2. Clear video tracing for production ramp-up analysis Output scaling from 100 to 10,000 units requires careful analysis to identify optimisation opportunities Operators often struggle with equipment malfunctions in production lines, necessitating video playback for diagnostics. This process can be time-consuming due to unclear images or difficulties locating the video feed. Moreover, in fast-paced industries like electronics, setting up a new production line involves a capacity ramp-up. For instance, output scaling from 100 to 10,000 units requires careful analysis to identify optimisation opportunities and improve line capacity. This also necessitates quick and clear video tracing. Specialised production line cameras are invaluable in these scenarios. Production improvement features Unlike traditional models, their compact, industrial design and variable zoom make them perfect for different assembly lines, even in tight spaces. These cameras capture fast-moving processes at high frame rates and offer slow-motion playback for detailed analysis. When integrated with third-party systems like PLCs or barcode scanners, they quickly locate video feeds, aiding in rapid issue identification, equipment diagnostics, and production improvements. 3. Real-time video viewing with rapid response In production lines, having real-time visibility of various parts is crucial. Imagine working in one area and needing to see what’s happening in another instantly. Relaying messages between people can waste time and lead to mistakes. HDMI cameras connected directly to screens offer real-time high-definition, low-latency live feeds, allowing workers to assess conditions quickly and accurately. Use of AR With instant alerts directly on the AR screen, they can swiftly pinpoint and resolve issues on-site Enhanced by AR, these live feeds display vital data such as production metrics, safety updates, and equipment statuses. This integration empowers operators to oversee operations efficiently. For instance, when a production line halts unexpectedly, operators traditionally call personnel for investigation. With instant alerts directly on the AR screen, they can swiftly pinpoint and resolve issues onsite. Discover Hikvision’s production line visualisation solution Hikvision combines AR technology, specialised cameras, and centralised management software to strengthen the connection between production line operations and management. This approach enhances situational awareness and efficiency, creating a safer and more productive work environment. Specialised cameras Explosion-proof cameras ensure safety in flammable environments, and air-cooled withstand high temperatures To meet diverse production line needs, Hikvision offers various specialised cameras. High-frame-rate cameras capture rapid movements on fast-moving conveyor belts, while vibration-resistant cameras provide stable footage for overhead cranes. Macro cameras with auto-focus lenses deliver detailed close-ups, while separated covert cameras fit confined spaces. Explosion-proof cameras ensure safety in flammable environments, and air-cooled or water-cooled cameras withstand high temperatures. Visualisation solutions By implementing Hikvision’s visualisation solutions, enterprises can boost production efficiency and management, gaining a competitive edge in the market. Embracing advanced technologies fosters intelligent and efficient production management, paving the way for future growth.
Axis Communications, a pioneer in network video, has announced the launch of a powerful bullet camera that delivers superior image quality and excellent forensic value. This all-in-one, outdoor-ready camera features a custom-made, tele lens ideal for long-distance surveillance to deliver extremely high pixel density even in low-light conditions. With many possible applications from smart cities and airport perimeters to stadiums and transport hubs, this powerful camera is ready out-of-the-box. For example, it is supplied with a mounting arm for easy installation, and a spacious back box ensures secure cable management. In addition, PoE out makes it possible to connect and power another device without any additional cabling. This eliminates the need to rent extra ports and simplifies installation. Axis range of network cameras Linn Storäng, Regional Director Northern Europe, Axis Communications, commented, “This new bullet camera is a very versatile addition to the Axis range of network cameras. With a powerful custom lens, it’s suitable for a wide range of possible applications where an outdoor setup is needed to protect areas with a large perimeter." "With optimised IR, it allows for surveillance in complete darkness without the need for extra lighting, plus, it delivers valuable metadata for efficient forensic search in live or recorded video.” AXIS Q1809-LE Bullet Camera Axis Zipstream reduces bandwidth and storage requirements without compromising image quality Built on a dual Axis system-on-chip, this camera includes Axis Edge Vault, a hardware-based cybersecurity platform that safeguards the device and protects sensitive information from unauthorised access. It also offers FIPS 140-3 Level 3 certified secure cryptographic key storage and operations. Furthermore, Axis Zipstream reduces bandwidth and storage requirements without compromising image quality. AXIS Q1809-LE Bullet Camera offers 41 MP at 15 fps or 8K at up to 30 fps. It features a 4/3” image sensor for exceptional low-light performance. With a custom-made, tele (50–150 mm) Canon lens and 21°-7° horizontal field of view, it delivers extreme detail over great distances. 3x zoom also makes it ideal for identification purposes. Thanks to electronic image stabilisation (EIS), it ensures smooth video in situations where a camera is subject to vibrations, for instance, at sports arenas. Key features Key features include: Out-of-the-box and outdoor-ready Superior image quality in 8K High light-sensitive 4/3” sensor Extreme detail at great distances Built-in cybersecurity with Axis Edge Vault
Integrity360, one of the pan-European cyber security specialists announced its partnership with Darktrace which will see Integrity360 act as a reseller for Darktrace’s entire portfolio of IT/OT services and initially offer the Darktrace/DETECT and RESPOND/Network™ solutions as part of its Managed Detection and Response (MDR) offering. Darktrace/DETECT and RESPOND provide threat detection and autonomous response capabilities to address the burgeoning attack surface across the extended perimeter. Darktrace ActiveAI Security Platform™ Under the terms of the agreement, Integrity360 will act as a channel partner offering the entirety of the Darktrace ActiveAI Security Platform™, including its AI-powered solutions: PREVENT, DETECT, RESPOND, and HEAL with the DETECT and RESPOND Network services also available as part of Integrity360’s MDR offering. The managed service will see DETECT and RESPOND telemetry data fed into Integrity360’s SOCs The managed service will see DETECT and RESPOND telemetry data fed into Integrity360’s Security Operations Centres (SOCs) and supplemented with support services. Integrity360 plans to add the Darktrace/OT offering integrated with MDR later in 2024, consolidating Integrity360’s reputation as a pioneering MDR provider. Darktrace DETECT Darktrace DETECT is the company’s flagship Network Detection and Response (NDR) offering and gathers data from proprietary hardware, virtual sensors, and endpoint sensors as well as data from other endpoint and infrastructure security solutions. It utilises Darktrace’s unique Self-Learning AI engine and can enhance its analytics by leveraging third-party APIs. There are no prerequisites for the NDR solution, such as a SIEM or firewall, which has previously been a barrier to some of those organisations looking to procure the technology. RESPOND is an automated response solution available alongside DETECT that can take autonomous action to disrupt an attack. Darktrace’s Self-Learning AI Darktrace’s AI learns from native and 3rd party sources to understand the unique digital fingerprint of a business The heart of Darktrace DETECT + RESPOND/Network is Darktrace’s Self-Learning AI, which features multiple types of AI, including supervised and unsupervised machine learning techniques, Bayesian probabilistic methods, LLMs, and hundreds of behavioural models to learn an organisation in real-time from the inside out. Wherever it is deployed, Darktrace’s AI learns from native and 3rd party sources to understand the unique digital fingerprint of a business which means it can spot when something is out of character. This approach empowers organisations to spot unknown unknowns. Advanced managed service Integrity360’s MDR is unique in the market in that it enables customers to select the right combination of XDR, SIEM, EDR, and NDR technologies for them, depending upon the size of the organisation, its risk profile, and compliance requirements. The Darktrace technologies will be offered across three incrementally advanced managed service tiers: Managed Platform – an entry-level offering for those looking for an optimally implemented, monitored, and managed NDR platform with alert forwarding Managed Threat Detection – adds SOAR integration, threat intelligence enrichment, alert triage, incident investigation and notification, and ongoing alert tuning Managed Detection and Response – add response and containment, proactive threat hunting, and threat intelligence reporting Comprehensive assessment Delivery of the Integrity360 Darktrace MDR Services involves a comprehensive assessment Delivery of the Integrity360 Darktrace MDR Services involves a comprehensive assessment of the organisation’s architecture and appliances before Darktrace sensors are strategically placed across the network. The sensors continuously collect metadata which is fed into the Darktrace platform where the detection engine uses advanced behavioural modelling techniques powered by ML and AI-driven threat-hunting algorithms. All telemetry is then analysed in a SOAR and alerts are passed to the Integrity360 SOC team who have complete visibility of the environment by the Darktrace Threat Visualizer console and can advise upon incident management and compliance reporting. Real-time visibility “Security teams are struggling to monitor increasingly complex environments and adhere to compliance frameworks amid the noise of alerts,” states Brian Martin, Director of Product Management, Integrity360. "NDR can facilitate rapid detection across these networks, giving real-time visibility into attack paths associated with ransomware, supply chain attacks, crypto-mining, and insider threats, for instance." Extra service layer Key markets for DETECT and RESPOND include large enterprises, critical national infrastructure "At the same time, autonomous response can help arrest the attack. But organisations don’t necessarily know what to do with that telemetry. That’s where MDR comes in, providing that extra service layer over the technology to meet investigative and compliance demands." "It’s a value add that turns a useful solution into an indispensable one." Key markets for DETECT and RESPOND include large enterprises, critical national infrastructure, and associated industries, highly regulated sectors subject to strict compliance mandates, and those with high-value or sensitive data sets. Vital, proactive, defence "We are thrilled to partner with Integrity360, to help strengthen their MDR offering and expand the protection Integrity360 offers," said Eloina Pesce, VP of Channel, EMEA at Darktrace. “Darktrace’s Self-Learning AI Engine, combined with Integrity360’s deep cybersecurity expertise and support services can provide a vital, proactive, defence to customers no matter how complex their environment. We look forward to extending our partnership.”
Vision Security Technologies is proud to announce that it has been recognised as the North America Value-Added Reseller of the Year for 2023 by LenelS2. This prestigious award underscores Vision Security Technologies' unwavering commitment to excellence in the security industry, innovative security solutions, and exceptional customer support, distinguishing the company as the top vendor within the LenelS2 network. Seamless services LenelS2, renowned as a global pioneer in access control technology, is celebrated for its solutions, including OnGuard, which effectively safeguard buildings, people, and assets. Vision Security Technologies takes pride in its certified installers who deliver seamless services to partners at local, regional, and global levels, consistently meeting and exceeding industry standards. Innovative security solutions Barry Komisar, CEO of Vision Security Technologies, expressed his heartfelt gratitude for this esteemed recognition. He emphasised the critical importance of the company's partnerships and commended the entire Vision team for their hard work and dedication in achieving this honour. "Our team's commitment to delivering innovative security solutions and exceptional customer support has set us apart in the industry. This award is a testament to our dedication and the strong partnership we have built with LenelS2," said Barry Komisar. Electronic security systems Vision Security Technologies has earned its reputation for providing top-of-the-line security solutions to clients As a pioneering systems integrator in the security industry, Vision Security Technologies specialises in designing, installing, and servicing electronic security systems. It has earned its reputation for providing top-of-the-line security solutions to clients nationwide. Del Deason, Senior Vice President, said, "This award reflects the countless hours of strategic planning undertaken alongside our outstanding Lenel RSM and Sales Leader." Value-Added Reseller of the Year Receiving the LenelS2 North America Value-Added Reseller of the Year award is a source of immense pride for Vision Security Technologies. The company remains committed to offering cutting-edge security solutions to its valued customers and expresses profound thanks to LenelS2 for this recognition and to its dedicated team for their unwavering commitment to excellence.
Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centres Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Case studies
One of the pioneering players in the global packaging ecosystem, this manufacturing facility transforms over 100,000 tonnes of paper, paperboard, and laminates annually into diverse, high-value packaging solutions. Established in 1925, it caters to industries such as food and beverage, personal care, and consumer goods, with a robust presence across India and select global markets. Recognised for operational excellence and innovation, the business holds numerous prestigious awards and certifications. With a strong focus on customer delight and sustainable packaging, it partners with major brands like P&G, Nestle, and Unilever. Business Scenario To address these challenges effectively, the facility of a video surveillance system was felt essential Without a video surveillance system in place, the company faced recurring security breaches and unauthorised access to its manufacturing units, which raised significant concerns for employee safety and the protection of assets. Instances of product mishandling and operational inefficiencies went unnoticed, underscoring the critical need for a video surveillance system. To address these challenges effectively, the installation of a video surveillance system was deemed essential. Additionally, they wanted a video surveillance system that ensured uninterrupted monitoring to avoid missing crucial events. Challenges Security Vulnerabilities: The absence of a video surveillance system posed risks to employee safety and the protection of valuable assets such as machinery, raw materials, and finished products. Operational Oversight: Instances of product mishandling were not promptly detected or addressed due to the lack of a robust video surveillance system. This compromised productivity, and quality control within the manufacturing unit. Loss Prevention: The inability to monitor activities effectively increased the risk of inventory shrinkage, theft, or damage to goods. This not only affected financial losses but also disrupted supply chain operations and customer deliveries. Inaccurate Weighbridge Monitoring: Inaccurate weighbridge monitoring made it difficult to verify truck weights before and after loading, which caused fraud and serious operational issues. Regulatory and Compliance Risks: Without a proper video surveillance system, it was challenging for the manufacturing unit to meet stringent regulatory standards, potentially leading to regulatory penalties. Solution Solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the digit plate All the vehicles entering and exiting the premises were monitored with Matrix Automatic Number Plate Recognition Solution. This solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the number plate. SATATYA SAMAS - Video Management Software then uses OCR technology to convert this captured number plate image into a digital number and store it in the database. The loading and unloading facility was closely monitored with the help of Matrix Weighbridge Monitoring Solution. This aided in the accurate tracking of shipments, which prevented fraud. Matrix 5MP Dome Cameras were strategically placed above production floors, assembly lines, packaging areas, and quality control stations within the manufacturing and warehouse facility. These cameras provided detailed monitoring of manufacturing processes, ensuring product quality and operational continuity with clear footage. Additionally, they were installed in administrative offices, break rooms, and training areas contributing to workplace safety. Matrix 5MP Bullet Cameras were deployed for robust outdoor and perimeter surveillance. They monitored loading docks, outdoor storage yards, parking lots, and security checkpoints. These cameras secured critical infrastructure such as HVAC rooms and electrical rooms, ensuring the safety and integrity of vital systems. SATATYA SAMAS - Video Management System The video surveillance system was configured in such a way that ensured uninterrupted recording All 100+ cameras were integrated with SATATYA SAMAS - Video Management System aiding in live view, and playback of the network cameras in the premises. The facility also opted for the CREAM (Cognitive Response Engine and Automated Monitoring) module in SATATYA SAMAS to improve employee safety. Two IVAs were configured in this case - Tripwire and Motion Detection. The Tripwire IVA could be used to monitor specific areas that had to be obstructed, while Motion Detection IVA helped in identifying accidents or unusual activities in the obstructed areas. Both IVAs worked in tandem, providing real-time alerts and video pop-up notifications. The video surveillance system was configured in such a way that ensured uninterrupted recording. Even if the recording server failed, the recording would be pushed to the management server by the network cameras. When the recording server was functional again, the footage was again pushed to the management server. Products Offered: SATATYA SAMAS PLT (1No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM5 (24 Nos.): Licence for Adding 5 Additional Cameras SATATYA SAMAS USER3 (01No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR3 (01No.): 3 Camera Licences for Automatic Number Plate Recognition SATATYA SAMAS CREAM5 (01No.): 5 Camera Licences for Automated Monitoring SATATYA CIBR50MVL12CWP P2 (04 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIBR50FL40CWS P2 (63 Nos.): 5MP IR Bullet Camera Fixed 4mm Lens SATATYA CIDR50FL40CWS P2 (53 Nos.): 5MP IR Dome Camera Fixed 4mm Lens Benefits The manufacturing facility is extremely satisfied with Matrix Video Surveillance System and is now planning to rely on Matrix for its needs at additional plant locations across India. Matrix's Automatic Number Plate Recognition (ANPR) and Weighbridge Monitoring Solutions streamlined operations by accurately tracking vehicles entering and leaving the premises, reducing manual errors and cutting down on weighment fraud. Employees experienced a greater sense of security with the help of CREAM in Matrix VMS, as it lowered the risk of accidents in the facility. With regular monitoring, the video surveillance system minimised product mishandling and prevented process errors, while also protecting assets and machinery. Matrix Network Cameras kept a constant watch over inventories, warehouses, and storage yards, making it easy to track stolen goods using surveillance footage. Matrix VMS and the server systems ensured 24/7 recording of the facility, maintaining continuous surveillance even in critical situations, providing a reliable and secure environment.
A mix of Hubble Panoramic and PTZ cameras from Dahua Technology have been installed at Tripoli Stadium in Libya to help it meet modern international standards. Built in 1970, it is the largest Olympic stadium in the country and has been renovated and refurbished to meet FIFA’s requirements for stadium safety and security. Challenges With a capacity of 50,000 spectators, the stadium becomes crowded on match days and control of spectators and crowds becomes paramount. With only a limited number of police, security and stadium staff to rely on, stadium managers needed to have an overview of crowd flows and potential congestion to help ensure safety at these busy times. In addition, the stadium needed to stream images of match action to large screens strategically located inside and outside the stadium for fan interaction, as well as provide screens for advertising. Solution Cameras contain wise roles such as face recognition, perimeter protection and people-counting A mixture of eight Hubble panoramic and more than 180 WizMind 5 series cameras have been installed at the stadium to improve the situational awareness for stadium managers and the security team. The Hubble cameras are situated high up in the stadium to provide a panoramic overview, while being able to track specific incidents. They consist of an array of fixed cameras providing 180o, 270o or 360o coverage, together with an integrated dome camera to zoom into a particular scene and track specific objects. With Ultra HD resolution of up to 24MP, Hubble also features crowd number and density detection, vehicle-counting and density monitoring and augmented reality mapping. Dahua’s DSS video management software The cameras are available in dust-proof, waterproof and vandal-proof versions Also installed are more than 180 WizMind 5 series cameras. Featuring Starlight and deep learning algorithms, the cameras incorporate intelligent functions such as face recognition, perimeter protection and people-counting, which all greatly improve the accuracy of video analysis. The cameras are available in dust-proof, waterproof and vandal-proof versions. Intelligent recognition plays a big part in the security of the stadium, with cameras being able to identify and subsequently track any blocklisted suspects. This feature is also used at the entrance of the stadium to validate authorised ticket holders. Also installed are giant 15m x 9m LED screens to provide images of play on the pitch, as well as advertising coverage. All equipment is managed by Dahua’s DSS video management software located in the central control room. Results The installation of the Dahua equipment has provided stadium staff and security personnel with a high degree of situational awareness at the venue. They are now able to control access to the stadium through face recognition, anticipate overcrowding and potential congestion points with automatic heat mapping from camera images and track suspicious people or potential incidents. The cameras also provide a high degree of perimeter protection to detect and track abnormal intrusion.
A renowned global pioneer in international education services provides various programs and comprehensive support to students pursuing their educational goals abroad. Originating from Australia in 1969, its primary objective has been facilitating educational opportunities worldwide. The company is closely associated with IELTS (International English Language Testing System), and it assists students in studying in English-speaking nations like Australia, New Zealand, Canada, Ireland, the UK, and the US. Company profile In India alone, it has over 70 offices across 61 cities and grew its operations in Southeast Asian nations Situated in Delhi, India, the company’s Indian headquarters serves as a central operational hub, addressing the diverse needs of Indian students aspiring for overseas education. With a team of dedicated experts, the centre offers students personalised guidance, counselling, and support nationwide. In India alone, it has over 70 offices across 61 cities and expanded its operations in Southeast Asian countries. Motivated by a commitment to excellence, integrity, and student success, the company continues to empower individuals, fostering global connections and promoting cultural understanding through international education. Challenges Ensuring the integrity of its assessment process Needed a standard procedure that could be replicated across 61 locations Evidence capturing to confirm the identity of the student appearing for the exam Needed a surveillance solution that ensured compliance at the centre Need to capture footage locally and centralised monitoring The surveillance solution should be dependable, scalable, and interoperable Business scenario The institute sought a wide surveillance solution that captured the details of every student As the co-owner of the IELTS, the institute faced significant challenges in ensuring the integrity of its assessment process for students studying in English-speaking countries. With centres spread across India and other Southeast Asian countries like Sri Lanka, Bangladesh, and Bhutan, they needed a reliable surveillance solution to verify the identity of candidates at their assessment centres. It was crucial for the assessment process to be standardised across 61 locations and easily replicable in new centres. With 11 assessment centres and 49 centres where students arrived for assessment, the institute sought a comprehensive surveillance solution that captured the details of every student entering their premises and cross-referenced them with their system centrally. Additionally, they required a robust recording architecture to store video evidence for future reference as needed securely. In essence, the company faced the distressing challenge of establishing a surveillance solution that was dependable, scalable, capable of capturing essential details, and interoperable. They needed a distributed architecture with centralised control to meet their surveillance requirements effectively. Solution The surveillance solution comprised of: The challenges faced by the institute were swiftly assessed by Matrix experts, who devised a robust surveillance structure to ensure compliance across multiple centres in India and abroad. In all 61 centres, Matrix 2MP PTZ cameras with 25x optical zoom were strategically installed to capture the faces of candidates arriving for tests and match them with their recorded details in the system. The movement of each candidate was meticulously recorded in the system to maintain accurate identity records. The action of each candidate was meticulously recorded in the system to keep real identity records Further, the accuracy was enhanced by adding a secondary layer of surveillance to monitor compliance with the SOP. Matrix PTZ cameras with 25x optical zoom adeptly captured intricate event details recorded in the computer. To meet the needs of each centre, NVRs (Network Video Recorders) with different capacities were installed. This enabled the local recording of details at each centre. Following the client's specifications, the NVRs were configured to store recorded details for three months. Additionally, cameras were installed at the 11 OSM sites to ensure compliance at the places where the papers were assessed. Products offered SATATYA MIBR20FL36CWP: 543 2MP IR Bullet Camera with 3.6mm Lens with Audio SATATYA MIDR20FL36CWP: 264 2MP IR Dome Camera with 3.6mm Lens with Audio SATATYA PZCR20ML25CWP: 76 2MP Pan-Tilt-Zoom Camera with 25x Optical Zoom SATATYA NVR1601X - 8 Nos 16 Channel NVR with 1 SATA Port SATATYA NVR1602X - 8Nos 16 Channel NVR with 2 SATA Port - 8 Nos SATATYA NVR3202X - 1Nos 32 Channel NVR with 2 SATA Port SATATYA NVR3204X - 31Nos 32 Channel NVR with 4 SATA Port SATATYA NVR6404X - 2Nos 64 Channel NVR with 4 SATA Port SATATYA NVR6408X - 7Nos 64 Channel NVR with 8 SATA Port MATRIX LICENCE DONGLE 200 Enterprise VMS: USB Dongle to Run Licence Application SATATYA SAMAS PLT Enterprise VMS: Software for up to 65,535 Cameras SATATYA SAMAS CAM100 - 5Nos Enterprise VMS: 100 Camera Licence SATATYA SAMAS USER3 - 5Nos Enterprise VMS: 3 Concurrent User Licence Benefits Enhanced Assessment Integrity: By implementing Matrix 2MP PTZ cameras with 25x optical zoom across all 61 assessment centres, the company ensured the integrity of the assessment process. These cameras meticulously capture the faces of candidates arriving for tests, allowing them to verify their identities and maintain accurate records. Standardised and Replicable Procedure: The Education Centre needed a standard procedure that could be replicated across the extensive network of centres. The Matrix surveillance solution provided it with a standardised approach that could be easily implemented in new locations, ensuring consistency in its assessment process. Compliance Assurance: The addition of Matrix PTZ cameras with 25x optical zoom and a secondary layer of surveillance helped them monitor and ensure compliance with the Standard Operating Procedures (SOP) at all times. Dependable and Scalable Surveillance: Matrix's NVRs with different capacities allowed the Institute to locally store recorded details at each centre while ensuring reliability and scalability for future expansion. Centralised Monitoring: To streamline the operations, they needed a surveillance solution that allowed seamless central monitoring. Matrix's solution facilitated the cross-referencing of student details with their system centrally and, enhancing efficiency and data accuracy. Interoperability: Matrix's surveillance solution is designed to be interoperable, ensuring seamless integration with the existing infrastructure. This interoperability enables them to adapt to evolving technological requirements while maintaining the integrity of the assessment process. In summary, Matrix's comprehensive surveillance solution not only addressed the immediate challenges but also provided a robust foundation for the assessment process, enabling them to uphold the highest standards of integrity, compliance, and efficiency across all assessment centres.
Dahua Technology Indonesia has donated a Dahua DeepHub Smart Interactive Board to the Faculty of Economics and Business (FEB) at Universitas Gadjah Mada (UGM), demonstrating the company’s commitment to supporting the advancement of education in Indonesia. The Country Director of Dahua Technology Indonesia, Royce Ouyang, expressed his gratitude for this charitable opportunity during the handover event held at the Alumni Hall of FEB UGM on March 14. Royce Ouyang said, "We are pleased to contribute to the development of education in Indonesia. We hope this 75” Dahua DeepHub Smart Interactive Whiteboard can enhance students' learning experience, enabling them to be more interactive and innovative in class and be in line with the latest developments abroad." Artillery of sophisticated features The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device. Its package includes the smart interactive whiteboard, plug-in USB camera, 11th generation i5 processor 8GB+256GB, activated Windows 11 Pro, as well as a mobile stand and wireless screen sharing cable. This intelligent device is equipped with an artillery of sophisticated features, including a 4K screen, eight quick access buttons, fast charging, fast file sharing, the ability to switch between Android and Windows, a high-resolution camera, wireless screen sharing with various devices, and other advanced functions that enable smoother and more collaborative interaction in the classroom. Dahua DeepHub Smart Interactive Whiteboard The Dean of FEB UGM, Prof. Dr. Didi Achjari, M.Com., Ak., CA, expressed his appreciation for the generous donation, stating that the device will not only bring a more collaborative learning experience for their students, but also support various educational activities, research, and community service at FEB UGM. "We are committed to utilising it as best as possible to improve the quality of education in our environment," he said. "The support of advanced devices such as the Dahua DeepHub Smart Interactive Whiteboard facilitates FEB's academic community in adopting innovative teaching methods. Thus, it can improve student absorption and prepare them to face future challenges," said Gumilang Aryo Sahadewo, SE., M.A., Ph.D., Vice Dean of FEB UGM. He also stated that the use of the Dahua DeepHub Smart Interactive Whiteboard is expected to enhance the interaction between lecturers and students and facilitate collaboration in the learning process. Industrial sector and education In addition, this equipment can also support the development of innovative and technology-oriented curricula. "With this equipment, we hope that FEB UGM can continue to strengthen its existence as a pioneering educational centre that innovates and is competitive," he added. With the donation of Dahua DeepHub Smart Interactive Whiteboard to FEB Universitas Gadjah Mada, Dahua took a positive step towards strengthening the relationship between the industrial sector and education, empowering the youth of now and enabling a smarter society and better living.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed toward this sector, estimated to grow at about 10% per year. There is no doubt that the Middle East has become one of the most important and fastest-growing security markets in the world. While traditional real estate management requires a location-based approach, the digital transformation of the marketplace means that centralised systems management will replace the traditional approach, and that's exactly what Provis is starting to think about. The customer Provis is a property management company based in the United Arab Emirates (UAE) Provis is a property management company based in the United Arab Emirates (UAE). With over 25,000 units under property management, over 28,000 units under Owners’ Association management, and thousands of properties sold and leased. Based on their accumulated in-depth industry knowledge, and technical expertise, it is their commitment to provide sustainable value-added services through the assets of their clients. Integrated service solutions To provide integrated service solutions based on international standards, allowing clients to focus on their core business with peace of mind, thereby setting a new benchmark for integrated real estate service solutions globally. For its owners to centrally manage their users and deliver smarter, easier real estate solutions to their customers, Provis turned to Anviz's integrator partners, PROGRESS SECURITY & SAFETY SYSTEMS and MEDC, for assistance. The challenge The company's business continues to grow and expand across various regions of the country Traditional property management in the UAE local area is inefficient and intensive, property managers need to spend a lot of time and energy to manually deal with those complicated and repetitive work. Conventional management is unable to effectively analyse a large amount of data, making it difficult to provide a basis for decision-making. Impact on user experience The delay and errors of manual processing are the very drawbacks that can be precisely removed in information management. Moreover, as the company's business continues to grow and expand across various regions of the country, the practice of processing information in a decentralised manner by location not only tends to create information silos, making it difficult to integrate and share data but also leads to delays in customer service due to lack of information exchange, thereby affecting user experience and the corporate image. The solution Thinking about the cut-and-dry and providing a heartfelt service Face Deep 3 maximises supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres No matter whether in the youthful campus or orderly government and other places, there will be the movement of people. Quickly and accurately checking people is a basic requirement for front-end devices, and their Face Deep 3 maximises this need. It supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres (6.5 feet) in less than 0.3 seconds, with customised alerts and various reports. The Account Manager of Provis said, "In the past, we always struggled with the data integration of multi-point control. Having used terminal devices and software that were not part of a single system, we found that it had no linkage effect and could not solve the problem of event recording and data sharing. And location-based time and attendance solutions were ineffective in centralising user management." Perspective of the CrossChex system Based on the scenario of property management, the personnel are scanned and inspected by Face Deep 3 and then redirected to the management department through the CrossChex application and CrossChex Cloud Web software to achieve data sharing and transfer. Thus, the workflow of the property personnel is streamlined and standardised. Efficiency and cost management CrossChex system integrates the property work content in an all-round and multi-dimensional way From the perspective of the CrossChex system, it integrates the property work content in an all-round and multi-dimensional way, which makes property management more scientific and orderly, improves management efficiency, and reduces cost. Meanwhile, the CrossChex system adopts a centralised management approach to gather all the information resources on a single platform. It also supports integration with ERP solutions to facilitate integrated management, which can reduce manpower and improve efficiency. The benefits Precision management, digital intelligence service CrossChex Cloud, as a software platform with customised functions based on customer scenarios, combined with Face Deep 3, which is embedded with the most updated technological algorithms, seamlessly handles the data of people's movements and promptly processes the event records to form multi-form visualisation reports. Additionally, it supports business customisation and expansion to meet different business needs. It provides safe and reliable data encryption and rights management to protect user information security. Client’s quote Provis' Project Manager said, "Choosing to use Anviz's time attendance devices and cloud-based platform, allowed us to solve 89% of the repetitive steps for our owners' property management matters, making our brand image more visible."
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Expert Panel Roundtable: What is “deep learning?” How well does the security industry understand its full potential?
Products
Videos
PTZ cameras: Manufacturers & Suppliers
- Hikvision PTZ cameras
- Dahua Technology PTZ cameras
- Hanwha Vision PTZ cameras
- AV Costar PTZ cameras
- LILIN PTZ cameras
- Bosch PTZ cameras
- Axis Communications PTZ cameras
- Pelco PTZ cameras
- Vicon PTZ cameras
- Avigilon PTZ cameras
- Honeywell Security PTZ cameras
- Videotec PTZ cameras
- Sony PTZ cameras
- Messoa PTZ cameras
- Verkada PTZ cameras
- IDIS PTZ cameras
- FLIR Systems PTZ cameras
- Illustra PTZ cameras
- TruVision PTZ cameras
- Visionhitech PTZ cameras
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download