Video management software
HENSOLDT UK are pleased to announce the launch of SPEXER 600 multi-mission, X-Band ground-based surveillance radar utilising SharpEye solid-state transceiver technology. Building upon the excellent pedigree of well-established HENSOLDT products and technologies, SPEXER 600 complements the SPEXER family of Active Electronically Scanned Array or AESA radars, offering a cost-effective and truly crew portable field deployable solution. Design and function Designed to meet user requirements to det...
Globally renowned IP video surveillance integrator, NW Security (NW Systems Group) has signed a partnership agreement with the major unified, intelligent security-as-a-service solutions provider, Arcules. Arcules VSaaS platform The Arcules Video Surveillance as a Service (VSaaS) platform provides organisations with an underlying cloud infrastructure, which offers features such as compatibility between sites, low video latency, data encryption, redundancy, streamlined maintenance, automatic fir...
Integrated security manufacturer TDSi is pleased to announce a raft of new features for its GARDiS range of integrated software and hardware security systems. Additional features for 2021 include integration options for Lift Control, Area Occupancy, and ANPR – which are all designed to assist with not only security, but also ongoing safeguarding of health and social distancing requirements. Common security needs Tina Baker, TDSi’s Software Project Manager commented, “The new...
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27” and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity t...
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualisation for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security...
Eagle Eye Networks, the globally renowned company in smart cloud video security, has shared the trends that will have the biggest impact on video surveillance, security, and use of analytics, to drive business intelligence and improvement in 2021. Cloud and advanced analytics Customers are asking for the cloud and advanced analytics will transform video surveillance systems into even more valuable business solutions. Compliance requirements are constantly evolving and IT departments are engagi...
News
Hanwha Techwin, a global supplier of IP and analogue video surveillance solutions, has announced the expansion of its line of public health surveillance technologies with the new Wisenet TNM-3620TDY body temperature detection camera. The multi-purpose device uniquely combines Artificial Intelligence (AI) with a dual-sensor design to securely monitor facility entrances and accurately identify potential health risks. Wisenet TNM-3620TDY camera The Wisenet TNM-3620TDY body temperature detection camera offers two detection modes to discreetly scan people entering a facility. When used in estimated body temperature (EBT) mode, the camera’s 2-megapixel visible light sensor captures and sends AI-based face detection data to its QVGA-class thermal sensor, which simultaneously measures the body temperature of each subject. Temperature monitoring is accurate to within +-0.3⁰ C when used with a blackbody calibration device and the camera will trigger audio/visual alarms and notifications when elevated temperatures are detected. An onscreen display indicates a subject’s temperature measurement, and a colour-coded indicator is shown over their face. High-resolution surveillance video The Wisenet TNM-3620TDY camera can also be used as a traditional radiometric device The Wisenet TNM-3620TDY camera can also be used as a traditional radiometric device, with the visible sensor providing high-resolution surveillance video to assist in identifying people and activities. In this mode, onboard video and audio analytics are available to detect area intrusion, line crossing, loitering, and temperature detection. A spot temperature measurement feature also enables operators, via a web viewer, to obtain targeted temperature measurements by isolating specific areas within an image. Keeping customers and employees safe The TNM-3620TDY joins Hanwha Techwin’s full suite of solutions for helping businesses adapt during the COVID-19 pandemic, comply with new public health guidelines and keep customers and employees safe. “Business owners and managers of public spaces need flexible options for remaining open and operating efficiently,” said Ray Cooke, Vice President, Products, Solutions, and Integration, Hanwha Techwin America. Integrated with Wisenet 7 System on Chip (SoC) Ray adds, “With this new camera and all our solutions for occupancy level monitoring, face mask detection and social distancing measurement, Hanwha Techwin gives them a choice of health and safety technologies they can tailor to their operations.” The new TNM-3620TDY is based on Hanwha Techwin’s Wisenet 7 System on Chip (SoC), the core technology driving its enhanced image quality and advanced cyber security protection capabilities. The camera has a Micro SD/SDHC/SDXC slot that allows up to 256 GB of video data to be stored at the edge. This method of recording is useful in the event of a network disruption, enabling video evidence that potentially might have been lost to be easily and quickly retrieved when a connection is restored. Seamless connection to VMS, NVR and video decoder The TNM-3620TDY camera can also complement a facility’s existing COVID-19 safety protocols The camera can connect to a VMS, NVR or video decoder, or be used as a standalone device to comply with healthcare privacy concerns. The camera’s face detection area can be customised, for example to target the eye region, to prevent false positives from a warm forehead. The TNM-3620TDY camera can also complement a facility’s existing COVID-19 safety protocols, as people with detected elevated temperatures can be discreetly asked to enter a separate screening area for secondary screening with an FDA-approved clinical thermometer temperature reading. IEC 60601 certification The TNM-3620TDY is compliant with a series of technical standards for the safety and essential performance of medical electrical equipment published by the International Electrotechnical Commission (IEC). In addition, Hanwha Techwin has completed the Food and Drug Administration’s (FDA) facility registration process, with device registration for FDA 510(k) clearance in progress. The TNM-3620TDY supports H.265, H.264 and MJPEG compression formats, as well as WiseStream II, Hanwha Techwin’s compression technology which dynamically controls encoding, balancing quality and compression, according to movement in an image. Users can improve network bandwidth efficiency by up to 75% when combining WiseStream technology with H.265 compression.
BlueVoyant, a cybersecurity services company, announces a strategic partnership with UK-based third-party risk management consultancy, DVV Solutions, to deliver BlueVoyant’s Cyber Risk Management (CRx) services to DVV Solutions’ global customer base. This will be delivered primarily through BlueVoyant’s Vendor Risk Management (CR3) solution, which provides risk identification, analysis and threat remediation. Through DVV Solutions, BlueVoyant will generate, triage, prioritise and communicate security updates to DVV customers, providing actionable intelligence as part of its Vendor Risk Management service. Supply chain vulnerabilities This allows BlueVoyant to actively reduce DVV Solutions’ clients' exposure to the real threats their businesses face, instead of solely identifying the threats without context. Frequently, organisations do not have the in-house skills or resources to address these supply chain vulnerabilities, with assessment and identification being very labor intensive. DVV Solutions can help its customers to maximise their investment in third-party risk management programs Now, as a BlueVoyant partner, DVV Solutions can help its customers to maximise their investment in third-party risk management programs, utilising BlueVoyant’s CR3 managed services offering. This provides customers with access to unmatched visibility and expertise, to meet the desired vendor risk management requirements, while improving their own cyber risk postures, and those within their vendor ecosystems. Security monitoring services Robert Hannigan, Chairman at BlueVoyant International, comments: “The knock-on effect of COVID-19 has led to squeezed financial margins and a reduction in the resources available to tackle third-party risk in the supply chain; just as the pandemic widens the attack surface. Our CR3 solution will provide the desired level of risk analysis and remediation for DVV Solutions’ customers and their vendor ecosystems, enabling them to effectively quantify, manage, and remediate third-party security risks.” Sean O’Brien, Managing Director of DVV Solutions, adds: “Partnering with BlueVoyant is a natural extension of our third-party risk management and security monitoring services. As businesses and their vendor ecosystems have changed throughout an unprecedented 2020, we have seen a sharp uptick in the requirement for managed services, as supply chains become increasingly complex. Organisations therefore require a managed service-based third-party risk management solution to cut through the noise, helping them to prioritise the most pertinent supply chain risks.” Risk management program “By utilising our collective team of risk experts in this managed service model, customers will quickly improve the return-on-investment from their third-party risk management program. This will also enable them to re-allocate resources towards what’s important: eliminating control gaps, raising security standards and reducing overall risk,” added O’Brien. BlueVoyant will also deliver its Cyber Risk Management for Investors (CRi) solution BlueVoyant’s CR3 service complement DVV Solutions’ dedicated third-party risk management services portfolio. This portfolio includes on-site/virtual audits, risk assessments, questionnaires, security ratings, continuous monitoring, cyber risk maturity consultancy and regulatory compliance services. BlueVoyant will also deliver its Cyber Risk Management for Investors (CRi) solution, as part of DVV Solutions’ mergers and acquisitions (M&A) consultancy. This service effectively identifies cybersecurity risk throughout the investment process, such as pre- and post-investment and acquisition. Mitigating cyber risks This provides the desired expertise to assess, quantify, and mitigate cyber risks associated with a potential transaction or an investment portfolio. This level of due diligence is becoming an increasingly important pillar of the Environmental, Social and Corporate Governance (ESG) frameworks that many organisations are adhering to. Robert Hannigan concludes: “Organisations are now realising the responsibilities they have in actively identifying and managing cyber risks throughout their vendor ecosystems, and how this directly impacts operational resiliency and financial stability. Our CR3 services enables an increasing number of customers and prospects across the UK and Europe to address these issues, building upon DVV Solutions’ existing managed services portfolio.”
Security breaches of borders, utility plants and airports can have catastrophic and devastating consequences, so protecting assets is vital. The global perimeter security market is expected to reach USD29.6 billion by 2025, driven by growing terrorist threats, increased awareness of illegal immigration, planned crimes, thefts and smuggling. Continuous monitoring system Existing perimeter intrusion detection technologies typically rely on point sensors such as cameras that are positioned along a perimeter or border at regular intervals. However, cameras have their limits. They can only provide line-of-sight coverage at specific points; they do not deliver continuous monitoring or provide full visibility of the entirety of the perimeter. Asset monitoring technology This is where LiveDETECT comes in. This real-time linear asset monitoring technology from Fotech, a bp Launchpad company, turns fibre optic cables along a border or perimeter into an entire, continuous length of sensors, monitoring the asset at all times. “The sheer distance of some borders and perimeters means it is impossible to achieve true round-the-clock monitoring of the perimeter length with physical patrols or CCTV.” “The solution of positioning cameras every few metres is not feasible from an economic point of view yet leaving gaps in coverage is an open invitation for threats and intrusions,” says Ken Crowe, Security Industry Sector Manager for Fotech. Distributed Acoustic Sensing (DAS) technology Helios DAS analyses the changes to identify and to categorise the disturbance event LiveDETECT uses Distributed Acoustic Sensing (DAS) technology, which sends thousands of pulses of light along with fibre optic cables every second and monitors the pattern of light reflected back. The fibre optic cable picks up any acoustic or vibrational energy, which changes the light pattern that is reflected back to the hardware, Helios DAS, indicating a disturbance of some kind. Thanks to advanced algorithms and processing techniques, Helios DAS analyses these changes to identify and to categorise the disturbance event, such as walking near or interfering with a boundary, placing a ladder on a fence, or digging near a perimeter. Each type of disturbance has its own signature, and the technology can tell an operator in real-time, what happened, exactly where it happened and when it happened. More importantly, it can also filter out background noise, adapting its response for high-risk or low-risk zones along the perimeter. Perimeter security “If a perimeter is near a frequently-used track for runners, we can ensure that the normal activity doesn’t set off alarms.” “However, a personnel signature at 3 am or one that stops near the fence perimeter would be viewed as unusual. Any deviations from a normal pattern of behaviour can be programmed and an alert raised,” says Crowe. If a security breach is detected and there is an attempted intrusion, the system alerts the Alarm Management Server and security personnel so they can take the most appropriate action. There are three levels of alert: green, amber and red. Red is the highest alert level, usually when someone or something could imminently breach the inside of the perimeter. Easily integrated LiveDETECT should be part of a foundational security strategy. It is easily integrated into existing security systems, working in conjunction with cameras, sentry posts and unmanned aerial vehicles (UAVs) also known as drones, to provide situational awareness and to enhance overall protection. “What LiveDETECT delivers is a perimeter with no security gaps. This increases the efficacy and accuracy of identifying potential breaches, as well as boosting the speed of response through the real-time detection of incidents anywhere on the perimeter,” Crowe adds. Active intrusion alert LiveDETECT is covert and intruders will be unaware of its existence With an active intrusion alert, LiveDETECT can provide information on where cameras should be pointing. Alternatively, LiveDETECT can send GPS coordinates of the on-going disturbance to a UAV, which automatically launches itself to investigate more fully. As fibre optic cables are typically buried in the ground, LiveDETECT is covert; intruders will be unaware of its existence. Furthermore, DAS is not affected by the weather, cameras would not be beneficial in a sandstorm or a snowstorm, whereas LiveDETECT can continue to operate reliably. Robust system “LiveDETECT is a robust system into which we can build extra safe-guards. The fibre optics can be configured in a dual-loop and run in parallel to provide redundancy, and maintain coverage if a sensing cable is maliciously or accidentally cut,” Crowe says. The monitoring system software can also be mirrored to a secondary site, so alerts are recorded in two locations, ensuring the responsibility does not lie with one person. Security for the future During the last decade, technological advances have helped increase the scope of perimeter security systems. Perimeter security systems have historically been used to detect and to deter intrusions in military facilities and critical infrastructure. Today, they are being adopted in commercial and transportation sites as well as residential gated communities in high-risk countries. LiveDETECT fills the gaps in the border and perimeter surveillance efforts, delivering continued monitoring compared to existing technologies, improved security, reduced human and drug trafficking and detection of tunnel digging. Crowe concludes, “LiveDETECT’s ability to provide continuous monitoring of an entire perimeter and to raise alerts in real-time, gives security teams the comprehensive overview they need to manage their operations and respond to threats effectively.”
A landmark global distribution deal between Anixter and Quanika opens a one-stop-shop supply route for major integration projects, making it easy to incorporate state-of-the-art Axis Communications and Milestone video technologies with Quanika’s access control and visitor management software, so as to allow off-the-shelf integration with a wide range of third-party systems. Global distribution deal The global distribution deal with Anixter streamlines delivery of major integration projects across private and public sector markets. ICT and security systems integrators can now purchase Quanika software direct from Anixter to integrate a full choice of vendor technologies, ensuring efficient procurement and giving them everything they need for project delivery. Quanika software meets the security, safety, and operational demands of small to medium businesses through to corporate enterprise, government, and multi-site applications, enabling off-the-shelf integration with a wide range of vendor technologies and systems. Quanika software added to Anixter’s product portfolio For the first time Quanika allows integrators to scale up AXIS Camera Station VMS" “The addition of Quanika software to Anixter’s global product portfolio provides compelling options for systems integrator customers to deliver end-to-end security and safety integrated solutions,” said Phil Campbell, European Sales Director at Quanika. Phil adds, “With Quanika Enterprise, users are no longer constrained by having only a limited number of cameras and devices. For the first time Quanika allows integrators to scale up AXIS Camera Station VMS to manage larger and multiple sites from a single user interface, while using powerful Milestone XProtect functionality for facilities and specific channels where it’s needed most.” New integrations to meet site-specific challenges Quanika’s solutions have been deployed at high profile sites across Europe, and the company has a growing reputation for being able to adapt its off-the-shelf software quickly, adding new integrations to meet site-specific challenges. Campbell also pointed out that the agreement with Anixter would also help integrators and their customers to adapt to the challenges now facing all organisations. He said, “Operational efficiency is now more important than ever, and our straightforward approach to corporate-wide systems allows people to work more safely, flexibly and securely in today’s challenging environments,” adding “We look forward to working with Anixter’s customers to deliver seamless solutions on major projects globally.”
VIVOTEK, the globally-renowned IP surveillance solution provider, has in recent years been committed to offering comprehensive solutions through multiple strategic alliances. Integrated access control Partnering with Chiyu Technology, one of the most experienced access control system provider in Taiwan, VIVOTEK rolls out the latest integrated access control and IP surveillance solution, an one-stop shopping, seamless integration, and easily managed solution to meet the market's demand. Traditional access control system requires time, budget, and third-party partners to adopt and integrate the intelligent IP surveillance technology with it. This new integrated solution, however, can be adopted in various fields at once and establishes a considerably higher level of security. Equipped with facial recognition and video tagging With facial recognition and video tagging, the new solution can accurately verify who is entering a specified area With facial recognition and video tagging, the new solution can accurately verify who is entering a specified area and then subsequently track where visitors go once they have entered. VIVOTEK also provides a wide selection of versatile network cameras to deliver high-quality imagery in diverse and changing environmental conditions. More importantly, security staff can easily manage both IP surveillance and access control systems through VIVOTEK’s VAST 2, user-friendly, intuitive video management software. All of these advanced features combine to provide an enhanced user experience while simplifying procedures of device setting and management. IP surveillance and access control integration “The integration of IP surveillance and access control has become a growing trend for Smart Security Systems. I believe this cooperation with IP surveillance pioneer VIVOTEK will build a mutually beneficial partnership, making us more competitive in the global industry,” said Eric Chang, General Manager of Chiyu Technology. From network cameras, and access control systems to backend software, VIVOTEK provides one-stop shopping solutions to create a new standard of customer service. Strategic partnership “It is our pleasure to team up with Chiyu Technology. With their profound expertise in the industry, we can reinforce our solutions' capability and realise the potentials of our products. We will be relentlessly devoted to offering more comprehensive and compatible IP surveillance solutions to unlock new possibilities for different applications and vertical markets,” said William Ku, Executive Vice President of VIVOTEK Brand Business Group.
Following the release of FLIR United Video Management System 9.0 (United VMS) in August 2020, FLIR announced the global availability of United VMS 9.0.1 with new advanced features. The latest platform update offers further streamlined access to system status and alarms around the clock for security teams to react to threat activities faster while enjoying improved reporting and cybersecurity functionality. Included advancements The advancements include updates to the FLIR Latitude VMS Software as well as Horizon and FLIR Meridian Network Video Recorders (NVR), featuring: The ability to access video and alarms from anywhere at any time using EZ Client for mobile devices, the FLIR web-based, feature-rich application Streamlined control centre operations with Quick View, the new optimised video scene tracking capability Access to system events for improved cybersecurity within the United VMS reporting tool, as well as the sign-off reporting and the capability to produce custom reports Additional bug fixes and other general software enhancements Enhancing the Health Monitor tool The United VMS 9.0.1 updates enhance the Health Monitor tool improvements that were launched with United VMS 9.0, which proactively monitors system health and alerts security personnel to issues before downtime occurs. This offers the ability to securely access video assets to receive event alerts anywhere and anytime, improves efficiency, and increases peace of mind. Supporting cameras and VMS Through an open platform solution, the system efficiently supports various visible cameras, thermal cameras, radars, and a combination of all three. Further, United VMS can accurately match any size installation while improving cost efficiencies through scalability and centralised management—no matter if the system supports a single location or multiple sites across the globe. The United VMS pricing structure provides extensive flexibility for deployment, including customisable software service agreements for simplified business continuity, further enabling critical facilities to make the most of this open platform solution while future-proofing its security system. Download for free Customers that previously purchased United VMS 9.0 can now download the update to United VMS 9.0.1 for free, other existing customers can contact FLIR support to get their system upgraded.


Expert commentary
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimises passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labour. All these features make it difficult to recognise people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognised or unrecognised people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialised software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorised access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimises and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorised access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
Securing Intelligent Transportation Systems (ITS) in the transportation industry is multi-faceted for a multitude of reasons. Pressures build for transit industry players to modernise their security systems, while also mitigating the vulnerabilities, risks, and growth-restrictions associated with proprietary as well as integrated solutions. There are the usual physical security obstacles when it comes to increasingly integrated solutions and retrofitting updated technologies into legacy systems. Starting with edge devices like cameras and intelligent sensors acquiring video, analytics and beyond, these edge devices are now found in almost all public transportation like buses, trains, subways, airplanes, cruise lines, and so much more. You can even find them in the world’s last manually operated cable car systems in San Francisco. The next layer to consider is the infrastructure and networks that support these edge devices and connect them to centralized monitoring stations or a VMS. Without this layer, all efforts at the edge or stations are in vain as you lose the connection between the two. And the final layer to consider when building a comprehensive transit solution is the software, recording devices, or viewing stations themselves that capture and report the video. The challenge of mobility However, the transportation industry in particular has a very unique challenge that many others do not – mobility. As other industries become more connected and integrated, they don’t usually have to consider going in and out or bouncing between networks as edge devices physically move. Obviously in the nature of transportation, this is key. Have you ever had a bad experience with your cellular, broadband or Wi-Fi at your home or office? You are not alone. The transportation industry in particular has a very unique challenge that many others do not – mobility Can you trust these same environments to record your surveillance video to the Cloud without losing any frames, non-stop 24 hours a day, 7 days a week, 365 days a year? To add to the complexity – how do you not only provide a reliable and secure solution when it’s mobile, travelling at varying speeds, and can be in/out of coverage using various wireless technologies? Waiting to upload video from a transport vehicle when it comes into port, the station, or any centralised location is a reactive approach that simply will not do any longer. Transit operations require a more proactive approach today and the ability to constantly know what is going on at any given time on their mobile vehicles, and escalate that information to headquarters, authorities, or law enforcement if needed; which can only occur with real-time monitoring. This is the ultimate question when it comes to collecting, analysing, and sharing data from mobile vehicles – how to get the video from public transportation vehicles alike to headquarters in real time! Managing video data In order to answer this question, let’s get back to basics. The management and nature of video data differs greatly from conventional (IT) data. Not only is video conducted of large frames, but there are specific and important relationships among the frames and the timing between them. This relationship can easily get lost in translation if not handled properly. This is why it’s critical to consider the proper way to transmit large frames while under unstable or variable networks. The Internet and its protocols were designed more than two decades ago and purposed for conventional data. Although the Internet itself has not changed, today’s network environments run a lot faster, expand to further ranges, and support a variety of different types of data. Because the internet is more reliable and affordable than in the past some might think it can handle anything. However, it is good for data, but not for video. This combination makes it the perfect time to convert video recording to the Cloud! Video transmission protocol One of the main issues with today’s technology is the degradation of video quality when transmitting video over the Internet. ITS are in dire need for reliable transmission of real-time video recording. To address this need a radical, yet proven, video transmission protocol has recently been introduced to the market. It uses AI technology and to adapt to different environments in order to always deliver high quality, complete video frames. This protocol, when equipped with encryption and authentication, enables video to be transmitted reliably and securely over the Internet in a cloud environment. One of the main issues with today’s technology is the degradation of video quality when transmitting video over the Internet Finally, transportation industry has a video recording Cloud solution that is designed for (massive) video that can handle networks that might be experiencing high error rate. Such a protocol will not only answer the current challenges of the transportation industry, but also make the previously risky Cloud environment safe for even the most reserved environments and entities. With revolutionary transmission protocols, the time is now to consider adopting private Cloud for your transportation operations.
In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organisations are still engaged primarily in “anywhere operations”, i.e. remote work, many organisations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organisations that have returned to in-person work. But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organisation will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organisations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organisations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.
Security beat
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organisations gain insight and optimise their business processes. Seeking to fulfil Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-user communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-first approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organisation and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organisation around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behaviour, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
Case studies
Global MSC Security announced that it has been appointed by the City of Edinburgh Council to consult on a planned upgrade of its video surveillance system from analogue to IP, as Edinburgh progresses towards its vision to become one of the world smartest capital cities. Working with the Council, Global MSC Security will use its public sector expertise to oversee the preparation of a tender specification of a fully integrated public space surveillance operation. Upgrading public realm CCTV surveillance system The appointment of Global MSC Security follows the announcement that the City of Edinburgh Council is investing over £1 million in its public realm CCTV (including housing blocks, transport network and Council buildings) and has also secured £712,000 from the 'Scotland's 8th City, the Smart City' European Regional Development Fund Strategic Intervention in support of an upgrade to its CCTV infrastructure, as part of its smart city programme. Global MSC Security has a wealth of expertise in public space surveillance, having consulted on dozens of local authority CCTV surveillance projects, including The Royal Borough of Windsor and Maidenhead, Central Bedfordshire, Buckinghamshire, Herefordshire, North Somerset, Barnet, Bristol City, Dorset, Neath and Port Talbot, Mid Devon and Maidstone and Luton Councils. Installing new IP cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, video management system (VMS) and encoders, with the right technology at the best price and implemented smoothly. Global MSC Security’s Managing Director, Derek Maltby stated “We offer a wealth of experience in specifying public space surveillance systems for local authorities. Global MSC Security is proud to be involved in what is a major initiative not only for the City but Scotland and its position as a leader in smart services and society.” Resilient and secure city surveillance system He adds, “This important and essential infrastructure upgrade represents a significant investment, and the resulting system will provide the Council with a function-rich, future-proof, highly resilient and secure surveillance system.” Derek further stated, “However, for any organisation making the switch from analogue to IP, it is vital that the transition is managed in the correct way, to maximise resources and optimise system performance. That begins with a robust tender specification, which is where our expertise lies.” The tender specification is expected to be released by the City of Edinburgh Council in February 2021 and the contract awarded in September.
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical IP video surveillance system that enables full connectivity from trains to the control room, there by replacing the existing CCTV approach. Safety-critical IP video surveillance system installation Each eight-coach train set, using Synectics’ T2000 platform, will help utilise a suite of IP 360-degree ‘fish-eye’ cameras Each eight-coach train set, using Synectics’ T2000 platform, will help utilise a suite of IP 360-degree ‘fish-eye’ cameras, in the vestibules and saloon areas, to provide high-quality surveillance information. Installation is expected to commence in September 2021, to be followed by an additional support contract to provide a five-year in-territory maintenance programme. IP video security technology Iain Stringer, Managing Director of Synectics, commented “We are delighted that Irish Rail has chosen our IP video security technology, alongside our design, programme management and installation capabilities, to upgrade surveillance on one of their premier InterCity routes.” He adds, “This win with Irish Rail represents a further step into on-vehicle heavy rail solutions for our Synectics Security business, building on our deep experience across light-rail markets.” Smart technology developments Iain further stated, “Irish Rail is our second public transport win in Ireland over the last few months and reflects our growing reputation for smart technology developments that meet next generation operator requirements. Our approach is opening up new opportunities for all rail operators to transition their video management capability to the cloud and improve operational effectiveness.”
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organised at a grand scale at Nashik, Haridwar, Ujjain and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralised Monitoring Software (CMS)
Boutique office company, Office Space in Town, has selected Opem Security to install SALTO Systems to provide access control for its newest serviced office development in London, Blackfriars. The company offers businesses and individuals flexible workspace solutions, providing serviced offices, co-working space, meeting rooms and virtual offices in London, Cardiff, Northampton, and Edinburgh. Designed meeting rooms Affectionately named the ‘Happiness’ building, this vibrant and quirky, new serviced office development is located in Tudor Street in the heart of London’s prestigious Midtown district. The building has undergone an extensive £8.5 million refurbishment that has transformed it into affordable uniquely themed, high-spec luxury offices intended to help boost productivity and wellness in a professional, HQ quality standard office – created for those who appreciate style with a twist. The building now incorporates over 475 workstations split over five floors The building now incorporates over 475 workstations split over five floors, each with its own individual colour treatment. The building also boasts nine individually designed meeting rooms – each based upon the theme of ‘what makes you happy’ ranging from a quirky hot air balloon designed room, through to an aquatic haven, deep down ‘under the sea’. Controlled air conditioning It is also the first building in the UK to feature Clear View Dynamic Glass - intelligent, electrochromic windows that automatically tint to maximise natural light and reduce heat and glare. The building also boasts the most-up to date technology, enabling it to achieve a Wired Score rating of Platinum, high standard soundproofing and individually controlled air conditioning, to support clients’ growth and business needs. Sara Chegwidden, Chief Operating Officer (COO) for Opem Security says “Right from the start of this project, the client wanted to incorporate the latest technology into the development. This meant that security for the building also had to be top notch, and that the access control system chosen had to be a technologically modern locking solution that would satisfy the needs of both the business and its users.” Integrated electronic locking SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution “It had to be wire free with no cabling requited for network points etc alongside the requirement to be able to grant access rights instantly and revoke them in real-time if and when required. An audit-trail overview of who accessed which door at which time together with easy installation completed the requirements. So, after a site survey and listening to how the customer wanted to operate and manage the building we recommended SALTO as the best product to fit the brief.” SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution that bring seamless access to every door in any building in an efficient, safe and secure accessible way. Building operating requirements It’s tailored to the customer’s needs and building operating requirements and designed to give users ultimate freedom of choice regarding system layout, type and number of access points as well as level of security. It enables users to incorporate the functionalities they need now, and upgrade accordingly as and when their needs grow. Security risks related to lost keys are completely eliminated and system operators can manage every door and user access plan from powerful web-based management software. Both staff and customers can open doors with convenient and flexible credentials; smart key card or by smart phone if required. There are no costs from lock replacement caused by lost keys, which saves valuable time and resources across the organisation. Operating smart cards Controlling access plays an important role in the security of any building The new security system is now installed, with a total of 88 doors across a mix of communal doors, offices, meeting rooms and exit doors secured by XS4 original narrow body smart handle sets and SALTO wall readers. Controlling access plays an important role in the security of any building and SALTO’s Innovative, wire-free technology allows stand-alone electronic locks to read, receive and write information via their operating smart cards. And, if the client chooses, they can also incorporate the use of JustIN Mobile technology making it easy and secure to incorporate smart phones as a part of their access control solution. Access control solution Office Space in Town’s Developments Director, Simon Eastlake, comments, “From initial investigation through to building wide deployment, Opem Security have provided an excellent service. SALTO now provides us with a robust future proof access control solution that allows for the integration for third party systems as well as wireless doors and mobile tech as we wish.” Jason Pelham, Founder and Chief Executive Officer (CEO) for Opem Security concludes “The combination of the SALTO SPACE platform together with competent engineers and clarity of direction from such a professional client ensured this project was a pleasure to work on. The installation was straightforward and this ensured we delivered the project on time and fully met Office Space in Town’s security expectations.”
Alberta Fire and Security in collaboration with CNS Digital Media is honoured and proud to announce a new commissioned CCTV System at Corinthia Royal, Budapest. The client, Corinthia Royal,Budapest, requested the design, installation and configuration of a holistic CCTV system by AVIGILON Trusted Security Solution. To come up with a proper compliant solution and a complete coverage, Alberta proposed the installation of a full Avigilon surveillance solution including over one-hundred Avigilon cameras with self-learning video analytics, 48TB Avigilon network video recorder, and Avigilon Control Centre video management software with Avigilon Appearance Search technology. Surveillance camera system Appearance Search video analytics technology uses deep learning artificial intelligence search engine Subsequently, Corinthia Royal Budapest sought to replace their analogue cameras by an end-to-end high definition surveillance camera system to maximise protection; to enable proactive event response and facilitate the recording; and to capture and sharing of clear footage. To address the above the Alberta proposed the installation and configuration of Avigilon Appearance Search technology system. Having this high tech surveillance system in place, enables the possibility to search for a person by incorporating unique characteristics of a face and appearance to find similar recorded footage of the same person or vehicle across multiple cameras installed on site, quickly and efficiently. In addition, Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence search engine to sort through hours of footage with ease. Analyses video data Hence, saving the Hotel time and effort during critical investigations. This is possible because Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route and identify previous and last known locations. Alberta Fire and Security takes this opportunity to thank all the people involved and that made this project a success with special thanks to Mr Mate Feher, IT Manager, Corinthia Royal.
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defence system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor centre. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”


Products


Round table discussion
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analysing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
White papers

Understanding video management systems
Download
Hikvision DarkFighter Technology for high-quality images at night
Download
Future-proof IP surveillance for harsh environments
Download
How to choose the right solution for video data to enhance security and operational intelligence
Download
The Most Viable Converged Solution for Video Security and Monitoring
Download
High Definition Stream Management Part 1: Maximum scalability and bandwidth management
Download
High Definition Stream Management Part 2: The technical details
Download

Videos
Video management software: Manufacturers & Suppliers
- Milestone Video management software
- AMAG Video management software
- Video Storage Solutions Video management software
- Axis Communications Video management software
- Vicon Video management software
- ExacqVision Video management software
- Avigilon Video management software
- Bosch Video management software
- Vanderbilt Video management software
- March Networks Video management software
- AxxonSoft Video management software
- Hanwha Techwin Video management software
- FLIR Systems Video management software
- Qognify Video management software
- Verint Video management software
- MOBOTIX Video management software
- eneo Video management software
- Verex Video management software
- Meyertech Video management software
- IDIS Video management software