Renesas Electronics Corporation, a premier supplier of advanced semiconductor solutions, introduced an ultra-high-definition (UHD) surveillance camera reference design to address today’s high-accuracy object detection and recognition needs for video security and surveillance systems. Developed in collaboration with Novatek Microelectronics Corporation and designed by Systemtec Corporation Ltd, the reference design includes a camera image sensor (CIS) board with phase-detection autofocus (...
Panasonic i-PRO Sensing Solutions Corporation of America, formerly Panasonic Security Group in the U.S. and now branded as i-PRO, is launching its new series of surveillance cameras with artificial intelligence (AI) engines. The new i-PRO X-Series enable analytical applications on the network edge, further optimising performance, system bandwidth and storage requirements. “Our new i-PRO X-Series take imaging to a whole new level by providing intelligent video analytics at the edge while m...
Identiv, Inc. announces the launch of 3VR Prime, the comprehensive video management hardware and software system as a service. 3VR Prime is designed to provide users with a no-upfront-cost, service-oriented, fully supported, 100% warrantied video management system (VMS) solution that delivers broader efficiencies to end-users seeking on-premises VMS solutions. 3VR Prime delivers an enterprise-class, scalable, intelligent VMS platform to customers of any size. Identiv’s 3VR Prime eliminate...
Synectics announces a series of new customer-driven capabilities in its advanced Synergy 3 command and control platform to deliver unparalleled system protection, incident detection, and third-party integrations. Synergy 3 is an intelligent surveillance and security solution, integral to the efficient operation of control rooms around the world. The latest Synergy 3 update focuses on the delivery of real-time data and systems integrity in line with rapidly evolving customer and industry concern...
The French authorities have renewed the maintenance contract of the French Coastal Surveillance System, SPATIONAV, building on an over 20 yearlong successful collaboration between the French Navy and Airbus for safer oceans. Since 2002, Airbus develops, deploys and maintains the SPATIONAV system, under the supervision of the DGA (French General Armament Directorate) for the programme direction and the SSF (Service de Soutien de la Flotte) for the sustainment, to support the French authorities ga...
Hikvision, the supplier of innovative video surveillance products and solutions, signed a deal with the protective intelligence company, Scylla Technologies Inc., to explore opportunities for AI technology collaborations. Scylla is an AI technology provider in the security and surveillance industry who specialises in preventive threat detection (PTD), vehicle identification and tracking (VIT), and Smart Suspect Identification Systems (SSIS). Image and facial recognition The partnership betwee...
Carrier Corporation is pleased to announce the launch of the TruVision Multi-imager panoramic camera that can be deployed for a wide range of security and surveillance applications. TruVision Multi-imager camera The TruVision Multi-imager camera is an ideal security solution for surveillance applications that would normally require multiple cameras installed at different positions, such as parking lots, large lobbies, or other open spaces. This multi-imager camera consists of four individual camera sensors that can be repositioned to best cover a scene. The camera is suitable for both indoor and outdoor applications. Compatible with TruVision Navigator and recorders The TruVision Multi-imager camera is fully compatible with TruVision Navigator and TruVision recorders Compared to the other traditional cameras that would each require individual cabling, camera licence and network connection settings, the camera requires only 1 network cable, 1 network connection and 1 camera licence. The TruVision Multi-imager camera is fully compatible with TruVision Navigator and TruVision recorders. This apart, the camera also seamlessly integrates with a wide variety of 3rd party applications through ONVIF. Repositioning of camera sensors for 360° surveillance The TruVision Multi-imager camera is considered perfectly suited for a wide range of surveillance applications, including installation at shopping malls, schools and colleges, large commercial buildings, parking lots, factories, warehouses, airports, ports and other critical infrastructures. Repositioning of the camera sensors allow user to position the camera heads so as to avail full 360° wide surveillance capability. Also, when the camera is mounted on the corner of a building, 3 camera sensors can be positioned to cover 270° view, while the 4th camera can look down to cover the area under the camera. The repositioning of TruVision Multi-imager camera sensors facilitates greater flexibility for a broad range of different scenarios and settings.
Alarm systems have been available for decades, but many solutions offer little functionality beyond a sensor triggering an alert in the event of a break in. To take alarms to the next level, Hikvision is bringing a number of new and innovative technologies to market, allowing customers to meet their home and business security requirements more fully and to help expand the alarm business. No one can stay alert for a potential home or business security breach every hour of every day. That’s why alarm solutions are critically important for customers in terms of identifying and reacting to any incident in the fastest and most effective way possible. Enhancing residential and corporate security Hikvision offers a broad range of alarm solutions and technologies for different customer requirements But not all situations require the same kind of alarm system, which is why Hikvision offers a broad range of alarm solutions and technologies for different customer requirements. In some cases, for example, a customer needs to be aware when the perimeter of a site or location is breached. In other situations, they may need to monitor entrances or site perimeters, to track multiple intruders at the same time, or to speed up responses in the event of attacks in buildings or in public spaces. Hikvision innovative alarm solutions To address this broad range of end-customer requirements, Hikvision has created a broad portfolio of innovative alarm solutions that are sophisticated, automated, and always fit for purpose. These allow one to: Meet customers’ home security requirements with Hikvision Intrusion Alarm A break-in at a customer’s home can cause major upset, as well as material and financial losses. With Hikvision Intrusion Alarm solutions, they can get peace of mind that their home is properly protected at all times. Hikvision Intrusion Alarm solutions To maximise home security, the intrusion alarm solutions combine a wide range of integrated detectors To maximise home security, the intrusion alarm solutions combine a wide range of integrated detectors, including door and window-contact detectors, break-glass detectors, vibration detectors, smoke, and temperature detectors. Customers can also stream video from their security cameras direct to their mobile phones with Hikvision’s pioneering Intruder Verification as a Service (IVaaS) technology, which seamlessly unites video with cutting-edge intrusion detection capabilities in a single platform. Wireless alarm control panels The Hikvision Intrusion Alarm solution includes wireless alarm control panels and peripherals that make it fast and easy to deploy in home environments. Wired products are also available for small commercial applications. For residential applications, end users can connect into the alarm control panel, receive alerts, and watch streamed video from CCTV cameras on their handheld device. They can also configure their home security system remotely and view alarm reports. Detect and track multiple intruders concurrently over large distances with Hikvision Security Radar Customers with large sites to secure may need to track multiple intruders concurrently. They can get this capability with Hikvision Security Radar, which offers a detecting distance of up to 120 metres and a 120° detecting angle. That means customers can cover sites of 15,000 square metres and – most importantly – they can track up to 64 targets simultaneously. Hikvision Security Radar To make life easy for customers’ security teams, they can define the different areas they want to monitor, such as the warehouse, the car park, the perimeter or entrance, and others as needed. One Hikvision Radar can link up to 4 PTZ dome cameras at the same time to check multiple targets via video. With Hikvision, customers also get an extremely low rate of false alarms. This means they can focus on real intruders rather than pets or other animals, or weather interference such as fog, rain or snow. Stop criminals before they can do any damage with Hikvision Perimeter Protection The best way customers can minimise safety risk and damage to their assets is to stop intruders while they are still outside of the site or building, and that’s what Hikvision Perimeter Protection is all about. To stop criminals in their tracks, we use two parallel infra-red bars that have to be broken at the same time for the alarm to be sounded. Hikvision Perimeter Protection solution With two infra-red bars, customers can filter out all kinds of false alarms With two infra-red bars, customers can filter out all kinds of false alarms, from small animals crossing their perimeter, to falling leaves or flickering lights, which means they always know when an intrusion threat is real. Furthermore, their solutions are temperature and weather hardened, enabling deployment outside, in all kinds of perimeter locations. Their customers can also monitor their perimeter security remotely via their handheld devices. Increase safety for people in public places with Hikvision Emergency Alarm An emergency situation can unfold anywhere, in a school, on a university campus, in a park, or in the street. To help security teams work effectively, and ensure that people feel safe wherever they are, Hikvision has created the Emergency Alarm system. Hikvision Emergency Alarm system This solution allows a person in an emergency situation or attack to call for help by pushing a button, or by broadcasting a call for help to police or emergency response teams, or both. The Hikvision solution has a built-in camera and audio recording facility to collect evidence of the events taking place. In addition to these benefits, the Hikvision solution is available in different formats and can be integrated with joined-up ‘safe city’ technologies, including dome cameras, license-plate recognition cameras, low-light cameras, and much more. This kind of solution is already being deployed to improve safety in cities, parks, universities and schools worldwide and can be deployed in a wide range of other customer scenarios. Fit-for-purpose alarm solutions for every application Based on these four key application areas, Hikvision alarm solutions cover all of customers’ home security and business security requirements. While Hikvision Intrusion Alarm solutions protect homes and small businesses against break-ins, their Security Radar, Perimeter Protection, and Emergency Alarm solutions enable protection of people and assets and rapid responses on a far larger scale, either for large sites or in smart-city environments.
Videotec is once again showing its ongoing commitment to keeping up to date with worldwide technological innovations with the announcement that most of the company’s products are available as Building Information Models (BIMs), created with BIMscript technology. Building Information Modelling Building Information Modelling (BIM) is a process based on 3D metadata that is full of useful information for the design, planning and integrated management of infrastructure or building projects. In particular, BIM offers huge economic and competitiveness advantages to architects, designers and project managers. Videotec BIM library The new Videotec BIM library has 3D models of the company’s video surveillance products, complete with data such as volume and dimensions, materials, appearance and technical characteristics. These are ready to be imported directly into a project or technical document. The Videotec BIM library is constantly being updated as it is filled with new documents that cover the latest product releases and it can be downloaded from the BIM Object portal.
Cyber security is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cyber security. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cyber security. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cyber security. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railway. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cyber security certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cyber security at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organisation: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organisation willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalogue. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cyber security in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimise the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cyber security. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimise expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
Videotec is strongly focused on the Indian market and the needs of their customers. For this reason, Videotec is pleased to announce that they have obtained the BIS and the CcoE/PESO certificates for the most requested products in the Indian video surveillance market. The BIS certificate, issued by the Bureau of Indian Standards (BIS), is mandatory for certain IT products which are imported in India and provides a guarantee of quality, safety and reliability to the customers. Potentially explosive atmospheres The BIS certificate is now available for the following cameras of range: MPXHD21VW0Z00B, MPXHD2FVW0Z00A, MMX2D0ZA, UCHD21TAZ00B, UCHD21UAZ00B, UCHD21WAZ00B, UCHD2FWAZ00A. The CcoE/PESO certificate, issued by the Petroleum and Explosives Safety Organisation (PESO), is also mandatory for all electrical components installed in potentially explosive atmospheres within the Indian country. The CCOE/PESO certificate is now available for the following Videotec range of explosion-proof PTZ cameras: MAXIMUS MPX - MAXIMUS MPXHD - MAXIMUS MPXT.
Connected Technologies LLC, provider of a powerful cloud-hosted security management platform and Digital Watchdog (DW™), the provider of digital recorders, surveillance cameras and video management software have unveiled new integrations between DW Spectrum and Connect ONE that provide deeper reporting and management controls for dealers and their customers. Connect ONE and DW Spectrum integrate natively through software to receive or trigger notifications or events without system configuration such as opening a vulnerable in-bound port on the end-user’s network, port forwarding or connecting to the user’s IP address. Output control and lockdown With the expanded integration, dealers can add new feature sets, events and notifications gathered from DW Spectrum’s VMS, NVR or surveillance cameras for viewing and control on the Connect ONE, all-in-one interface. “Connect ONE is focused on expanding the possibilities for integrated systems for our dealer-customers,” said Dan Simon, Co-Founder and Managing Partner, Connected Technologies. “This integration gives dealers the ability to provide more value in their managed services offerings through Connect ONE,” he said. Connect ONE’s users can receive events to monitor the health status of the NVR or perform special logging of activities or analytics. All Connect ONE Event Rules can be activated in response to NVR events such as report logging, notifications to users and system control – including arming, disarming, output control and lockdown. Connect ONE pushed system events such as arming, alarm, access, trouble and audit changes to the NVR are supported. Providing complete solutions ConnectOne’s ability to simplify integration with a variety of technology presents an opportunity for DW Dealers" Events are shown on the DW Spectrum interface to indicate the source and type of event along with a text description, such as user, zone, door, area, etc. Events received by the NVR can also record video bookmarks, trigger a camera preset and increase recording quality. “We are excited to see our technology partners take a deeper dive into DW Spectrum’s open architecture and all the functionality it offers,” said Patrick Kelly, Director of IP Video Solutions, DW. “ConnectOne’s ability to simplify integration with a wide variety of technology really presents an opportunity for DW Dealers to provide complete solutions.” DW Spectrum and Connect ONE integrate via direct network connection or DW Cloud. Integrated security management solution Following set up, users can retrieve a camera list for quick and easy configuration, view live video, search playback recordings, record snapshots upon an event from intrusion/access system for video verification and review a 10-second pre-event and up to a 45-second post event video clip. DW Spectrum is a powerful and user-friendly IP Video Management software, highly optimised to provide unlimited scalability, unmatched bandwidth savings and simplified system setup and management. Connect ONE by Connected Technologies is a cloud-hosted integrated security management solution which provides a single user interface to control intrusion, access control, video surveillance, critical environmental monitoring and energy management. Connect ONE works with the Bosch B and G series as well as DMP XR/XT series, ELK M1 series and Honeywell Vista Turbo security and access control panels.
The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain committed to keeping our people safe, while ensuring that our support and commitment to our clients are not compromised. Ensuring business continuity At AxxonSoft, our vision has always been to ensure business continuity through enhanced safety and video surveillance offerings. Adhering to the COVID-19 regulations, we are prescribing to social distancing to slow the spread of the virus. As such, we are utilising this time to ensure that our service offering is optimised to afford our clients the ability to repurpose and extend their remote working viabilities. As an essential service provider, we have ensured that we are providing the right tools to our clients to comply with regulations. Our video analytics and face recognition services have no reliance on on-site control rooms and, therefore, clients’ security solutions and personal safety are not compromised. Innovation reimagined During these precarious times, our focus remains on support and service. Our development team continues to work tirelessly to ensure that you can use our software during the lockdown and have accelerated innovation to this end. While we must maintain social distancing, we can and will still be of service to our community Therefore, we are proud to present version 4.11 of the Intellect PSIM, which offers our clients a neural network-based analytical tracker which recognises specific types of objects, such as humans and vehicles. We have also equipped this version with video wall management interface, automatic object tracking and a web reporting subsystem. Behavioural analytics generates data by detecting specific postures, like crouching, shooting or any potentially dangerous scenario. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement, offering a comprehensive bird’s-eye view to clients. This upgrade also upholds mandated social distancing measures and keeps any face-to-face meetings to a minimal. The silver lining is that you can even use this technology when the pandemic is over. Now that’s what I call experiencing the next with AxxonSoft! Finding solutions to the challenges Our specialist technology and frontline technical support staff will ensure that your business is protected during and post-lockdown. We will continue to ensure that we provide solutions to the new challenges that the coronavirus brings, ensuring that our clients can emerge stronger and more responsive to any changes in the future. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement While we must maintain social distancing, we can and will still be of service to our community. After all, change is not just about technology but about mastering mindsets. The COVID-19 disaster has demanded that businesses embrace tech disruptions as early as possible and apply technology in imaginative ways to define the new world of work. Until next time, stay safe!
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. Video surveillance technology provides added security for you, your family and your business In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant through these odd times and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimise losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Data capture form to appear here! Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware. Catch up on part one and part two of our banking security mini series.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralised view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A metre and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimising safety, improving efficiency and on maximising reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialised CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realisation of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metreing and regulating operations remotely from the master control room.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilising indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalising or burglarising the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
Teleste Corporation has been selected as a vendor of on-board video surveillance and public announcement systems to Stadler’s FLIRT trains for Wales & Borders in the UK. The end-customer in the project is Transport for Wales Rail Services. Teleste’s deliveries to Stadler will take place in 2020–2023. The on-board video security and surveillance system will include internal, external and pantograph front-facing cameras, video recorders and user interfaces. Additionally, IP amplifiers, passenger intercommunication systems, and driver microphones will be delivered to the trainsets as part of the public announcement system. “We are delighted to continue our cooperation with Stadler as a supplier on modern, state-of-the-art on-board systems to the FLIRT Electric Multiple Unit platform. Our solutions have been designed and tested for consistent high quality over the course of many years, and we are confident that they will provide Stadler with the right tools for building these innovative high-speed regional trains for safe and enjoyable travel,” said Jörn Grasse, Vice President of Rail Information Solutions at Teleste.
When Broome County, in the US State of New York, took the decision to upgrade its public safety radio network, it required the highest quality video surveillance system to safeguard its US$ 23 million investment in critical infrastructure. New radio network Working with Integrated Systems, a solution combining networked Axis cameras, illuminators and radar motion detectors, with Qognify’s Ocularis video management system (VMS) was installed, to deter, detect and respond to unauthorised activity, at each of its nine new radio towers. The new radio network replaces a system that was in place since the 1970’s and improves communications for police, fire, along with other emergency services and public works departments for the municipalities across the county. 24/7 security monitoring Each of the radio tower sites required a combination of networked PTZ and fixed cameras" Such mission critical infrastructure requires reliable round-the-clock security monitoring, so Integrated Systems was approached, for its reputation in the delivery of technology solutions to government and industry, to specify and install a new video surveillance system. President of Integrated Systems, Mark Hamilton, explains, “Each of the radio tower sites required a combination of networked PTZ and fixed cameras, as well as radar motion detection to provide comprehensive coverage that would ensure any unauthorised activity would be swiftly detected, automatically recorded and alerts triggered, to initiate a timely and appropriate response.” Axis camera and radar detection technology Axis camera and radar detection technology was chosen for interior and exterior use at each radio tower site and the award-winning Ocularis to provide the all-important integration. Hamilton adds, “Early in our engagement with Broome County we urged them to migrate from their disparate video surveillance architecture, whereby VMS, NVR and DVR systems were all being managed individually across the county.” He further said, “Our recommended solution was a single unified, IP-based system that was county-wide sanctioned. To achieve this, we specified the Ocularis VMS from Qognify.” Ocularis video management system Ocluaris is a VMS that is ideal for large-scale projects such as Broome County, with an emphasis on tactical real-time operations and live visualisation, it is supported by full system redundancy and 24/7 availability. Integrated Systems were impressed by Ocluaris’s rich feature set, intuitive user interface (including visually mapping of the entire camera estate) and impressive scalability. What’s more with Axis as a Qognify Technology Partner it instilled the confidence Broome County needed to switch to a more unified approach to video surveillance. PTZ and fixed cameras installed All surveillance camera footage is recorded and centrally archived at the County Data Centre Using Ocularis, authorised personnel at the Central Security Building and Emergency Management Services Centre have 24/7, 365-days access to live and archived footage from every camera at each of the nine sites. The PTZ cameras installed give a 360-degree view of each radio tower site, whilst fixed cameras monitor the tower yards main gates and shelter doors. Meanwhile, the radar motion detection system guards the perimeter. All surveillance camera footage is recorded and centrally archived at the County Data Centre via the county’s microwave data network. “If any suspicious activity is detected an operator can rapidly view, review and replay all relevant footage through Ocularis,” explains Hamilton. Use of video analytics and visual maps To aid the speed of response, the operator also benefits from the use of visual maps to rapidly determine what cameras are available across each site, as well as video analytics to minimise time required to trawl through footage to identify activities of interest. Broome County has been impressed with the Axis and Qognify solution, which has also been integrated with its existing county-wide video network that includes street cameras, buildings and mobile video command systems. The success of the project has been recognised with a prestigious Security Solutions Award. Hamilton concludes by saying, “Qognify’s Ocularis is now the lead VMS that Integrated Systems specifies whenever embarking on a new video surveillance project.”
Round table discussion
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyse that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
Surveillance systems: Manufacturers & Suppliers
- Dahua Technology Surveillance systems
- LILIN Surveillance systems
- Hanwha Techwin Surveillance systems
- Vicon Surveillance systems
- Visionhitech Surveillance systems
- Panasonic Surveillance systems
- Pelco Surveillance systems
- Videotec Surveillance systems
- VIVOTEK Surveillance systems
- Bolide Surveillance systems
- Avigilon Surveillance systems
- Hikvision Surveillance systems
- Axis Communications Surveillance systems
- Bosch Surveillance systems
- Arecont Vision Surveillance systems
- DRS Surveillance systems
- LTV Europe Surveillance systems
- UltraView Surveillance systems
- Oncam Surveillance systems
- Geutebruck Surveillance systems