Video surveillance solutions
Pelco, Inc., a provider of intelligent video surveillance solutions, releases the Sarix Professional (Pro) Series 3 Fixed IP cameras. Offered in mini-dome, bullet, box, and wedge configurations, these IP cameras deliver a balanced set of features and performance at affordable price points that allow for deployment across a wide range of indoor and outdoor applications, including low light and wide dynamic range capabilities with options of 1MP, 2MP, 3MP, and 5MP resolutions. Bi-directional aud...
Paxton welcomes a new Senior Product Manager to the United States team, bringing with him a wealth of knowledge and experience of the access control market. Jeremy Allison will be based in Greenville, SC, and will oversee the development of future products, making sure they meet the demands and expectations of the growing US market. With over 15 years’ experience in CCTV and control systems, Jeremy has worked as a product manager for a security company and has run his own integration comp...
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Tavcom Training, part of Linx International Group, is supporting police forces transformation programs, as they work towards the Policing Vision 2025 and adapt to the rise in digital evidence, with its Gathering Video Evidence course. Earlier this year, the CoPaCC National Police ICT User Survey results were published, and topping the list of digital evidence challenges for the 3,500 police professionals in England & Wales that responded were issues relating to CCTV evidence. The main pain...
Global cybersecurity firm GRA Quantum announces the launch of its comprehensive offering, scalable security suite, providing solutions based on a combination of managed security services and professional services, tailored to the specific needs of each client. Scalable security suite was created to give small to mid-sized organisations a running start when it comes to security, providing the same standard of security controls as large enterprises. Providing security solution According to GRA...
To reduce installation difficulty and extend the effective monitoring range of cameras, Dahua Technology, a video-centric smart IoT solution and service provider, launches mini PT/PTZ series, a small-sized IP cameras with various pan and tilt ranges. Boasting compact design and excellent product performance, the mini PT/PTZ series offers a cost-effective solution for various small- and medium-sized applications such as retails, hotels, casinos, supermarkets, entrances, etc. Effective monitorin...
IronYun, an AI-based video surveillance software company and Razberi Technologies, an open-platform video surveillance hardware company entered into a technology partnership, marking a turning point for IronYun’s physical security video surveillance solutions. With the introduction of IP cameras, physical security has become a strain on network bandwidth. Security response times can mean the difference between life or death. The technology required to store and quickly retrieve 4 mega pixel video used to identify threats, would not be possible without a high-quality surveillance storage server like Razberi Core. Razberi Core is IronYun’s technology solution for industries that require centralised video recording, hardened server-class appliances, and cybersecurity protection. Some of IronYun’s most demanding security customers are within government and military industries. Partnership to benefit customers We are excited to include Razberi’s video recording products in IronYun’s portfolio of video surveillance solutions"The next generation artificial intelligence video surveillance software company, IronYun, will begin deploying their video surveillance solutions with Razberi Core’s server storage hardware in Q3 of this year. Many of IronYun’s customers stand to benefit from the technology partnership. Razberi’s physical security video storage solution paired with IronYun’s artificial intelligence video surveillance software is pending deployment in smart city projects utilising centralised recording networks. “IronYun invests heavily in R&D and secures our intellectual properties, working hand in hand with industry leaders like Razberi Technologies,” said Paul Sun, CEO, IronYun. “We are excited to include Razberi’s centralised video recording products in IronYun’s portfolio of video surveillance solutions and anxious to deploy in smart city projects.” Enables real-time alerts for use cases The combined solution best equips end users to safeguard their facilities with the least amount of manual effortRazberi’s open platform configuration makes it easy for companies like IronYun to deploy Core units into a centralised video network in a plug-and-play fashion. Paired with IronYun’s high-accuracy AI video analytics, the solution eliminates false alarms, enables real-time alerts for various use cases, and decreases search and monitoring time to only seconds, which help business and investigators proactively respond in all situations. The combined solution best equips end users to safeguard their facilities with the least amount of manual effort. “IronYun has been a great partner,” commented Will Melendez, VP of Sales, Razberi Technologies. “We are proud to work closely with them on a variety of projects and utilise their expertise in AI video surveillance.”
MOBOTIX is the first manufacturer in Europe to obtain French 'CNPP certified' product certification for its video surveillance cameras, offering a guarantee of IT and electronic 'resistance' to cyber-attacks. “This recognition is proof of quality, performance, and also of the trust of our customers at a time when digital security is becoming a key issue for all stakeholders,” says Patrice Ferrant, Regional Sales Manager France, MOBOTIX. MOBOTIX announced its intention to focus more on cyber- security over one and a half years ago, in particular by launching the 'MOBOTIX Cactus Concept.' Product-integrated tools CNPP is a key player in France in risk prevention and control in the areas of fire/explosion security “The objective of this initiative is to promote cyber-security in the area of video protection and video-telephony. An integral part of our strategy is to develop a series of product- integrated tools and features that allow IT security administrators to protect their systems. Now that we have passed a series of tests validated by CNPP, it is truly rewarding to announce our certification today,” added Ferrant. "We are particularly proud to be the first European manufacturer to receive the CNPP certification. It confirms our efforts to offer cyber secure products and solutions to our customers worldwide," emphasises Thomas Lausten, CEO of MOBOTIX AG. CNPP is a key player in France in risk prevention and control in the areas of fire/explosion security, security/malicious acts, cyber-security, environmental issues, and occupational risks. Functional security characteristics “After several years of R&D and confronted with rising threats of cyber-attacks, CNPP developed a method for assessing the robustness of security/safety products against cyber-attacks. This approach allows us to add resistance to cyber-attacks to the functional security/safety characteristics that are already certified." The cyber- security work was led by CNPP in association with the National Cyber-security Agency of France" "This new acknowledgment, represented by the @ symbol combined with our certification marks, allows for the addition of a third-party assessment of the products’ ‘security by design.’ The cyber- security work was led by CNPP in association with the National Cyber-security Agency of France (ANSSI) with the aim of providing suitable validation for security/safety products that is completely compatible and complementary to specific ANSSI acknowledgments (FLSC*, common criteria, etc)." Cyber-security dimension "Today, these new CNPP Certified trust passports delivered for video surveillance cameras add a cyber-security dimension to the list of electronic security equipment already certified @ (NF & A2P @, A2P @, CNPP Certified), which allows the overall inclusion of the cyber-security dimension by CNPP." "With the integration of best practices for installation and IP-connected security/safety maintenance and with the frame of reference APSAD D32 through APSAD service certifications,” says Nathalie Labeys, Head of Pôle Electronique de Sécurité CNPP Cert. FLSC: First level security certification MOBOTIX is pleased to announce that it has obtained the certification 'CNPP certified,' which integrates the cyber-security dimension.
Johnson Controls announces Tyco Cloud, a new cloud-based security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organisations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet. Accelerating digital transformation Tyco Cloud empowers this digital transformation with on-demand security management" Tyco Cloud allows users to protect lives, assets and facilities through management of access control, video surveillance and other security operations using secure cloud services and connected devices such as cloud cameras and controllers. Cloud solutions from Tyco run on an open and modern microservices architecture to ensure fast, scalable and secure services. “Our customers worldwide are embracing and accelerating digital transformation to make their businesses more intelligent, agile and cost effective,” said Martin Renkis, general manager of Cloud Solutions, Global Security Products at Johnson Controls. “Tyco Cloud empowers this digital transformation with on-demand security management that enables organisations to securely and cost-effectively customise their video surveillance and access control solutions based on site-specific and enterprise-wide requirements.” Multiple recording parameters For video surveillance, organisations can enable Tyco Cloud with any Illustra Cloud Camera or leverage existing camera systems using Tyco Cloud Gateways, which will automatically locate existing cameras from dozens of different manufacturers on a network and enable secure cloud management of those cameras. Tyco Cloud enables video storage in camera, in gateway, in low latency cloud, in high latency cloud or a hybrid combination to support unlimited flexibility and cost effectiveness. The intuitive interface allows users to customise multiple recording parameters, such as which cameras to record and for how long, video resolution, as well as create unique upload schedules to minimise bandwidth consumption. The service also offers Cold Cloud video storage for cost effective, high latency online archiving. The new Hyper View feature enables users to search through 24 hours of recorded video from up to 100 cameras within 60 seconds. Smartphone based mobile credentials Tyco Cloud ioSmart was cloud first designed to deliver convenience, cost savings and advanced security Tyco Cloud surveillance also supports powerful analytics such as heat mapping, object detection and crowd formation to name a few. For access control, the new ioSmart solutions from Tyco Cloud empower smartphone based mobile credentials and smart key managed access control for companies to securely allow personnel to conveniently access facilities using their smartphones without the security risk of lost, stolen, or cloning of legacy card technologies. Tyco Cloud ioSmart was cloud first designed to deliver convenience, cost savings and advanced security for access control. The Tyco Cloud Enterprise Manager portal provides users with a comprehensive view of their entire security solution through a single interface. Proper password management It provides real-time status and management of every connected device on a clickable global map. This simple dashboard also enables tracking and management of users, bandwidth utilisation, cloud storage and device firmware. Additionally, Tyco Cloud secures all data from any device to the cloud and to the end user. Every connected device as well as the cloud platform are supported by the Johnson Controls Cyber Solutions Product Security Program, which delivers enhanced safeguards against cyber attacks, including additional controls for proper password management and end to end encrypted communications.
Beijing-based Pensees Technology Co Ltd (Pensees), known for its integrated AI-based solutions in computer vision and IoT technologies, formally unveiled the Pensees Singapore Institute, an R&D facility which will oversee the company's applied industrial research and delivery capabilities in Singapore and the region. The Institute was officially launched by Mr. Ma Yuan, the founder and Chief Executive Officer of Pensees, and Ms. Wang Rong Fang, the counsellor for Science and Technology at the Chinese Embassy in Singapore, who also had the opportunity to tour the facility. AI algorithm researchers Singapore plays an important role in the next wave of AI innovation" Pensees Singapore Institute, which marks Pensees' first foray into the international market, is part of the company's sustained growth strategy and continuous efforts to strengthen research in the fields of AI and deep learning. The facility is headed by Ms. Jane Shen, Group Chief Scientist and Managing Director, and will house up to 70 staff, comprising AI algorithm researchers, system researchers, hardware experts, and engineers. Mr. Ma, said, "Singapore is not only a country that is deeply committed to R&D; it is a thriving digital ecosystem, underpinned by its infrastructure, policy and enablers, making it a hotbed for AI experimentation and innovation. Over the years, we've seen how through a coordinated effort by Singapore's businesses, government agencies and citizens, it has quickly gained global recognition as the No. 1 Smart City. Singapore plays an important role in the next wave of AI innovation, and we are thrilled at the idea of establishing our footing here as we seek opportunities to enhance our offerings and work with AI talent from both academia and industry." Promoting AI innovation Since its inception in 2017, Pensees has successfully developed and deployed a full range of AI products and solutions in domains such as Enterprise Security, Public Security, Smart Community and Smart Factory. Its technology has also found its roots in more than 50 cities, autonomous regions and municipalities across China, serving over 1,000 clients. Pensees and AI Singapore will fund this project on a one-to-one basis Since expanding its footprint in Singapore, Pensees started collaboration with universities and polytechnics here. Pensees Singapore Institute has reached a Research Collaboration Agreement (RCA) with NUS for the joint development of the AI-based Camera System. This collaboration has been selected as one of the AI 100E projects under the AI Innovation Programme managed by AI Singapore, an organisation under the National Research Foundation to promote AI innovation. Pensees and AI Singapore will fund this project on a one-to-one basis, and the project will be conducted by the research team led by Professor Feng Jiashi at NUS and Pensees Singapore Institute. Autonomous system technologies Pensees also reached a Memorandum of Understanding (MoU) with Nanyang Polytechnic (NYP), where both parties agreed to collaborate in the area of autonomous system technologies, autonomous robots as well as AI application development and testing. Aside from having a strong team that focuses on autonomous system technologies and autonomous robots, NYP's School of Engineering also has outstanding R&D facilities and laboratories, while Pensees Singapore Institute's deep capabilities in computer vision and AI algorithms can be applied in autonomous systems for perception. By leveraging each other's strengths, this collaboration seeks to accelerate the development, testing and deployment of autonomous systems. Pensees formally signed the agreements with the NUS and NYP, witnessed by Ms. Wang Rong Fang and distinguished guests from government agencies, universities, and the industry. It also announced the formation of the Pensees Technical Advisory Board, which will support Pensees' technological advancement and research while ensuring that Pensees stays at the forefront of technological leadership.
Limitless Security launches a new fixed cost managed solution for the housebuilding and construction industries. This fully managed service takes away the headaches and hassles involved in installing, managing and maintaining security equipment on building sites. It will enable housebuilders to reduce the incidence of break-ins, theft and vandalism whilst maintaining and managing the costs of security within acceptable limits. Managed security solution This fully managed security solution includes detection, monitoring and response This fully managed security solution includes detection, monitoring and response using a SIA-licensed security guarding service. It covers everything from risk assessment, the supply, installation and management of all equipment, including Limitless Security’s battery operated VIDAR motion detectors with integrated image verification. Also provided are site security signage, documentation of any events for evidential purposes and the provision of information to responding agencies. “Our new service challenges the industry perception that the price of security may outweigh the cost of an intruder event. This is understandable when the costs of traditional manned guarding contracts and CCTV installations are taken into account,” said Adam Lees, Managing Director of Limitless Security. Fully managed service “We developed this fully managed service to meet the needs of housebuilders as it provides a complete solution for a single, fixed monthly cost to make budgeting easier and eliminate any unexpected additional charges.” Limitless Security monitors all installations around the clock from its Monitoring Centre which reacts and responds immediately should a security event occur. When required, SIA-licensed security guards are directed to an event location and VIDAR captured images can be sent to their smartphones or tablets to assist with identification.
Eaton’s SecureConnect™, a smart security management system for residential and commercial buildings, now has 4G capabilities. This secure plug-on module is a cloud communicator which enables a control unit to connect to the cloud using both 4G and 2G technology over mobile networks. Configuring the 4G cloud communicator as a back up to the panels Ethernet connection allows for dual path communications, ensuring that there is no loss of connection through power cuts or poor internet service. The unit is also an ideal solution for premises without an internet connection as it can provide fully independent mobile connectivity. Cloud-based systems SecureConnect™ enabled control panels are designed for use in for residential and commercial buildings, and when linked to the cloud, enable remote maintenance, monitoring and control via user-friendly web and mobile interfaces. All SecureConnect™ products are designed from the outset to deal with the increasingly sophisticated attacks that are targeting cloud-based systems, regular security updates deliver protection against the ever-changing threats. The secure cloud-based smart security management system has been thoroughly tested by Eaton’s Cyber-Security Centre of Excellence. Every new web-connected device provides a potential pathway for hackers" Glenn Foot, Scantronic Security Product Manager at Eaton, said: “SecureConnect represents an exciting development, making the installation, programming and monitoring of systems much faster and simpler for installers, and enabling end-users to benefit from greater convenience, control and peace-of-mind. However, every new web-connected device provides a potential pathway for hackers.” Potential cyber threats “It is therefore essential that cyber security is built-in from the very beginning and that best practice is correctly observed by technicians and homeowners. The new 4G cloud communicator further enhances the robustness of cloud connected systems providing dual path cloud connectivity when used as a back-up to a to a router connection. If an installer prefers have solution that is independent of the premises infrastructure, then module can also provide single path connectivity without the need of a router.” In addition to the product and technology solutions, Eaton offers training courses for installers to raise awareness of potential cyber threats and how to apply best practices. Eaton’s whitepaper, Protecting Home Security Systems from the Cyber Threat, explores the risks associated with cyber security, the challenges confronting installers and ways in which these can be addressed.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
An interim Federal Acquisition Rule (FAR) detailing how the U.S. Federal government will implement a ban on government use of video surveillance products from Chinese manufacturers has been released just days before the August 13, 2019, deadline for the ban to take effect. The interim rule will take effect immediately; it notes there are "urgent and compelling reasons… to promulgate this interim rule without prior opportunity for public comment". After the interim rule is published in the Federal Register, 60 days will be allowed for public comments to be submitted (tag comments and correspondence ‘FAR Case 2018-017’). The final rule will follow. The agencies issuing the interim rule are the Department of Defense (DoD), the General Services Administration (GSA), and the National Aeronautics and Space Administration (NASA). Banning Chinese video surveillance equipment The interim rule provides details about implementation of Section 889(a)(1)(A) of the NDAA for fiscal year 2019The interim rule provides details about implementation of Section 889(a)(1)(A) of the National Defense Authorization Act (NDAA) for fiscal year 2019, which the President signed into law on August 13, 2018, to take effect a year later. It bans government uses of telecommunications and video surveillance equipment produced by Hikvision and Dahua, among other companies. The interim rule also applies to telecommunications equipment produced by Huawei Technologies Company or ZTE Corp. (or any subsidiary or affiliate). Huawei manufactures HiSilicon chips widely used in video cameras. The interim rule requires inclusion of a clause prohibiting the listed telecommunications and video surveillance services on solicitations and/or resulting contracts that occur on or after August 13, 2019. Contractors who identify covered equipment during the performance of a contract are required to report it within one business day; and to report mitigation actions within 10 business days. The requirement is included in contracts with subcontractors. Identifying telecommunications equipment The rule requires submission of a ‘representation’ with each offer (government bid) to identify any covered telecommunications equipment or services that will be provided to the Government. The interim rule states: “DoD, GSA, and NASA recognise that some agencies may need to tailor the approach to the information collected based on the unique mission and supply chain risks for their agency.” The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period There is an option for contractors to "represent annually whether they sell equipment, systems, or services that include covered telecommunications equipment or services". A ‘no’ answer then applies to any contracts during the year. If a contractor answers ‘yes’, they are required to specify that each individual bid does not include the covered equipment. The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period. Waivers require a compelling justification, that the equipment be listed/reported, and that a phase-out plan is implemented. The Director of National Intelligence can also provide a waiver. Prohibits purchase of COTS items The interim rule also applies to purchase of commercial off-the-shelf (COTS) items: "Th[e] level of risk is not alleviated by the fact that the equipment or service being acquired has been sold or offered for sale to the general public... nor by the small size of the purchase." It prohibits ‘micro-purchases’ of covered products and services delegated by agency heads. The interim rule covers the NDAA Section 889(a)(1)(A), which is the ‘Chinese ban’ provision. It does not cover the ‘blacklist’ provision [Section 889(a)(1)(B)], which was the subject of a public hearing in July. According to the interim rule: "The prohibition in section 889(a)(1)(B) is not effective until August 13, 2020, and will be implemented through separate rulemaking." The ban also applies to current government installations, and there are questions about whether agencies and departments will comply in time.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities The search for an answer to the challenges of growing human urbanisation is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centres and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behaviour and gun violence. Such crime prediction software works by analysing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Faced with a number of security challenges and planned future expansion, a major airport decided it was time to implement a scalable security surveillance solution. Let’s take a look at how to manage such a scenario to ensure the selected solution provides scalability for growth. With the existing proprietary solution at the airport locked down to one manufacturer and littered with issues resulting in high maintenance and expansion costs, a new solution was required that would allow the airport to scale its surveillance solution in line with future expansion plans. Difficult in identifying people The low-resolution analogue cameras made it difficult to identify people during incidents Not only was the existing surveillance solution analogue and proprietary, it wasn’t intuitive and was difficult for operators to use. There were several ‘satellite’ security installations scattered in the various terminal buildings that weren’t viewable in the centralised Control Room which meant extra operators were required. The low-resolution analogue cameras made it difficult to identify people during incidents and coupled with the lack of video coverage, it gave operators poor situational awareness. Reviewing past events with the existing VMS was difficult as playback wasn’t synchronised and, without bookmarks, it was time-consuming to find important events. The combination of multiple terminal buildings and the Centralised Analogue Architecture resulted in bottlenecks and latency issues as all processing must pass through the centralised server. There was also no redundancy so if there was any failure in the system, the Control Room would no longer have the capability to view live or recorded video. Additionally, as the system was locked down to one manufacturer and the whole system had to be hardwired to the centralised server, there were very expensive expansion costs. Addressing security and scalability concerns New NVRs were specified to cope with the increase in camera streams and an extra NVR for redundancy and failoverThe required solution had multiple requirements to ensure that the existing issues were resolved and that the solution could scale with the planned expansion. With expansion planned to facilitate growing passenger numbers, an open IP based solution was specified to replace the existing analogue solution to improve situational awareness, provide scalability and integrate with a number of other systems operating in the airport. The architecture needed to limit bottlenecks, reduce latency issues, provide redundancy advantages and be scalable to allow for multiple new terminal buildings to be connected with ease. New HD cameras were specified to improve image quality and coverage, with a Video Wall required in order to view and manage the increase in video streams in the centralised Control Room. New large capacity NVRs were also specified to cope with the increase in camera streams and an extra NVR for redundancy and failover. Distributed Architecture reduces data bottlenecks A solution with Distributed Architecture was chosen as it solved multiple issues with the existing solution and facilitated future expansion without the need for a centralised server. Distributed Architecture allows data to be kept close to where it is produced or needed. When cameras, surveillance workstations, NVRs, alarm servers, integration gateways, all participate in a Distributed Architecture, data bottlenecks are minimised as all processing doesn’t need to pass through a centralised server. Distributed Architecture provides a truly unlimited and scalable solution that can easily accommodate the largest airports in the world. Enhancing situational awareness Distributed Architecture enables future expansion as it can support thousands of cameras, workstations and NVRsDistributed Architecture minimised the existing bottlenecks, reduced latency, and provided higher availability and faster access to data. It also allowed all ‘satellite’ security installations to be viewed in the centralised Control Room enhancing situational awareness. New HD cameras were installed and due to the scalability of Distributed Architecture, future cameras can easily be connected when needed. Furthermore, the scalability of Distributed Architecture enabled the airport to build new terminal buildings and connect with ease to the security solution when ready. Distributed Architecture enables planned future expansion as it can support thousands of cameras, workstations and NVRs, dramatically reducing the Total Cost of Ownership (TCO). The scalability of Distributed Architecture allows the airport to continue with planned expansion and add a single camera/NVR or a whole new terminal when needed.
Percepto has announced that the company has launched its market-leading industrial on-site autonomous drone solution in Singapore, through partnership with Certis - the leading advanced integrated security services organisation. On-site autonomous drone solution In October 2018, Certis announced that it has expanded its industry-leading ops-tech capabilities to deliver Security Plus (Security+) solutions. Today, Certis’ Security+ combines advanced security, facilities management and customer service into a single holistic service, supported and underpinned by technology. Percepto, the provider of the most advanced global Drone-in-Box solution for industrial sites, is a recipient of the Frost & Sullivan Global Enabling Technology Leadership Awards. Percepto CEO, Dor Abuhasira comments on entering the Singaporean market: “Percepto is proud to be selected by Certis to be its premier Autonomous Drone solution partner.” Singapore is breaking new ground in the commercialisation of innovative drone solutions" Abuhasira continues: “Singapore is breaking new ground in the commercialisation of innovative drone solutions, aided by the clear published regulations on the drone activity permit application by the local authority.” Integrated security with Security+ “As a technology-driven company, Certis now provides an integrated approach to advanced security, facilities management and guest services through what we now call Security+. In partnership with Percepto, we are pleased to introduce this technological solution, that enables us to reimagine new concepts of operations for our customers,” said Ms Fong Ying Ching, Vice President, Certis Technology. Percepto drones are equipped with high-definition and thermal cameras to enable day and night operation and can perform in hostile weather conditions including rain, snow and dust. When deployed in-the-field they take-off on-demand or at scheduled times and navigate pre-defined routes. Percepto cloud management system Once the mission has been completed the drone returns to its base station - a highly secure enclosed weather-proof box - where automated post flight checks and fast battery charging are completed, ensuring the drone is primed for the next flight. The system is controlled through Percepto’s cloud management systemThe system is controlled through Percepto’s cloud management system and it is also the only drone-in-a-box solution that is powered by computer vision and AI and provides communications over LTE. As a result, these drones provide aerial security for total surveillance monitoring and response. Industrial drones The partnership between Percepto and Certis signifies a major development for the use of industrial drones in Singapore in areas of security, surveillance and safety, maintenance, inspection, mapping and operations.
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer pub called The Filling Station known for its unique combination of ‘growlers, grub and gas’. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability While many things about the family-owned business have changed since its founding in 1973, the need to keep a close eye on each location’s inventory hasn’t. Like every retail organisation, Quik-E can cite numerous examples of theft, fraud and inventory errors that have cost the business thousands of dollars in lost revenue. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability, and that’s where its March Networks intelligent video solution really proves its worth. Video system helps curb thefts “I can’t tell you how many thefts I’ve caught with the help of our video system,” said Burgess. “I had a former employee just finish paying me back $13,000 they owed us in stolen goods, and we recently caught another employee who was stealing probably $50 worth of cigarettes each day.” “And just this morning I was reviewing video of a weekly delivery with one of our managers,” continued Burgess. “We were able to confirm that we’d been charged for $77 worth of gloves that we didn’t actually receive. The video showed the delivery guy come into the store and put everything down. Two boxes of gloves is easy to spot, so it was obvious that that portion of the delivery was missing.” Quik-E Food Stores has upgraded its video solution over the years and Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs New software capabilities Over the years, Quik-E Food Stores has upgraded its video solution to take advantage of better performance and new software capabilities. The March Networks video recorders first installed more than a decade ago have been slowly replaced by new generation 8000 Series Hybrid NVRs, able to support both analogue and IP cameras or a full complement of IP-only video. Hosted networking solution Burgess has also overseen the transition from older Visual Intelligence software to March Networks Command Enterprise software working with Integrated Technology Group (ITG), the retailer’s long-time systems integrator and March Networks certified partner. That’s in addition to moving the organisation from office servers to a hosted networking solution and switching from an existing point-of-sale (POS) system to a new Gilbarco Passport POS solution. “We’ve been proactive about upgrading our IT infrastructure over the last few years, and our video system has always come back online, except in one instance where we couldn’t get the cameras connected again in a couple of locations,” said Burgess. “March Networks Tech Support was wonderful. They managed to diagnose the issue, which wasn’t related to the video products in the end. They were just a big help.” March Networks Searchlight™ Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon Quik-E is also using March Networks Searchlight™ for retail, a software application that integrates surveillance video with the retailer’s POS transaction data to provide powerful search and investigation tools. Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs. “I use Searchlight primarily to look for voids and cancellations, or high dollar value transactions,” said Burgess. “We actually just used it to help catch a manager who probably stole thousands of dollars from us. I knew I was short in inventory, so I pulled up the video and transaction data to see if things were being rung up. It was clear they were not and we had the evidence to prove it. Now we’ll use that evidence to hopefully recoup our losses.” Satisfied customer Ultimately, Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon. “I think it’s one of the best video surveillance systems on the market. March Networks has been good to me over the years and I’m a very happy customer.”
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximise field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwest, many of which included older analogue cameras. They chose to install a mix of Hanwha Techwin models including Wisenet P series PNM-9000VQ multi-sensor / multi-directional outdoor vandal-proof dome cameras with 5 megapixel lens modules and Wisenet X series XND-8020F 5 megapixel indoor flush mount dome cameras. Surveillance cameras managed by Omnicast VMS The project, which started in June of 2018, has already deployed over 1,200 Hanwha Techwin cameras across 80 locationsColumbia Bank is in the process of the multi-phase upgrade that converts their existing branches to Hanwha Techwin video surveillance cameras managed by Genetec’s Security Center Omnicast Video Management System (VMS). The project, which started in June of 2018, has already deployed over 1,200 Hanwha Techwin cameras across 80 locations. They will complete another 60 sites in 2019, and 30 more in 2020. The video cameras serve as part of an overall physical security plan and are positioned to provide expansive coverage of bank interiors including teller lines, exteriors including parking lots and surrounding areas and ATM machines. Cameras bundled with analytics Armstrong said Columbia Bank tested out a of variety of models before deciding on Hanwha Techwin. “I didn't know which camera vendors would give us the biggest bang for the buck,” he said. “But I settled on Hanwha Techwin for a couple of reasons. One, is the price competitiveness and, two, the fact that the cameras come bundled with so many analytics that many companies want to charge extra for those licenses.” One of the analytics features the Columbia Bank security team uses with regularity is the loitering feature, specifically at their ATM machines One of the analytics features the Columbia Bank security team uses with regularity is the loitering feature, specifically at their ATM machines. “If an individual is loitering around one of our ATMs beyond the set time limit, then we have it programmed into Genetec’s Security Center to send an alert." "Omnicast snaps a photo of the loiterer and emails it to everyone designated on our security team. We then can take a quick look at that photo and quickly determine whether or not somebody is utilising the ATM as a customer or if they're doing something they're not supposed to, such as trying to break into the ATM or installing a skimmer.” Health monitoring of the cameras Armstrong said, as he tested cameras from other vendors, he noticed a consistent drop rate which he was concerned would get worse. Even though 98 percent availability seems acceptable, any downtime creates a risk of missing critical events" “Security Center provides health monitoring of the cameras, and what I looked for was if the availability started dropping below 98 percent. Even though 98 percent availability seems acceptable, any downtime creates a risk of missing critical events. One camera model we were testing was experiencing regular outages, where we would lose 30 seconds off and on throughout the day. These short loses added up quickly and we were seeing availability times dropping somewhere around 93 to 94 percent. That wasn't acceptable. “When I reviewed the data on the Hanwha Techwin model, the average availability was consistently above 99 percent, which was so impressive. It might just be a two percent difference, but it's inevitable that the one time you need it is the one time that camera is not working as expected. Columbia Bank was unwilling to accept the risk of utilising equipment that failed to meet our standards, and decided to partner with Hanwha Techwin, who provided a much more reliable end user experience.” Utilising H.265 and WiseStream compression Impact on network infrastructure and bandwidth were also determining factors for Columbia Bank as they chose to upgrade their video surveillance system. Armstrong said he was disappointed to find many camera manufacturers were not quickly integrating usage of H.265 compression technology into their products. He said he is impressed that Hanwha Techwin utilises H.265 in so many of its camera models, as well as the fact that Hanwha has incorporated its own WiseStream technology into its cameras, making them even more efficient. Hanwha Techwin Wisenet P and X series cameras use H.265/H.264/MJPEG with Hanwha’s exclusive WiseStream II compression technology Hanwha Techwin Wisenet P and X series cameras use H.265/H.264/MJPEG with Hanwha’s exclusive WiseStream II compression technology. WiseStream dynamically controls encoding, balancing quality and compression according to movement in the image. Combined with H.265 compression, the bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. Installing non-intrusive cameras Community banks are charged with keeping employees, customers, and assets safe, but also need to present a warm and inviting environment since they are often a hub of civic activity. In-your-face video surveillance cameras in a bank can be threatening to any would-be criminal, but they are also off-putting to customers that visit banks on a day-to-day basis. This allows us to get higher quality images – and a wider field of view – while not intruding into people’s personal space"When Armstrong and his team were evaluating camera solutions across its branches, they wanted to find a way to let customers know they were providing the latest in video security without the potentially intrusive analogue cameras that often can be found just inches away from customers during transactions at the teller counter. Higher resolution 5 megapixel cameras “It’s a balance – you want customers to feel secure, but you don’t want them to feel like they are in a prison or a fishbowl,” said Armstrong. He said they removed the older analogue cameras on the teller line and replaced them with the higher resolution 5 megapixel Hanwha Techwin models, which were placed off the teller line. “This allows us to get higher quality images – and a wider field of view – while not intruding into people’s personal space,” he said. SPD-150 49 Channel Decoder for connectivity One way to convey that Columbia Bank is all business when it comes to security was with an innovative decoder offered by Hanwha Techwin. Armstrong said they wanted to have video monitors showing surveillance camera feeds in certain higher-risk locations so that customers would know they are being recorded, and that would serve as a deterrent to any would be criminals. However, with the change in hardware, they were unable to connect monitors directly to a DVR. Armstrong said Hanwha’s SPD-150 49 Channel Decoder has allowed them to connect analogue, HDMI, and VGA. Columbia Bank has provided video evidence to help law enforcement investigate a variety of incidents including drive-by shootings, traffic accidents, and arson “Being able to put one Hanwha decoder unit in a branch and run three monitors off of it – as well as the ability to hook monitors up to some cameras directly – has saved us tremendous amounts of money while adding a visual security feature.” Adding cameras outdoor to assist community Columbia Bank has long emphasized that they are a community bank that’s community minded. When Armstrong and his team decided to upgrade their video surveillance solution, they made the decision to add video surveillance cameras to the exterior of all bank locations not only to protect their customers as they come and go, but also to assist the community and law enforcement when incidents occur in areas surrounding their branches. We’re very pleased with the solution from Cook Security Group, Hanwha Techwin, and Genetec" “We look at it as the opportunity to give back to the community and provide assistance in a variety of ways,” said Armstrong. So far, Columbia Bank has provided video evidence to help law enforcement investigate a variety of incidents including drive-by shootings, traffic accidents, and arson. Satisfied with the system’s performance Columbia Bank has been well served by the Hanwha Techwin-Genetec security solution and Armstrong said they are very satisfied with the performance of the system. “Hanwha Techwin has been a phenomenal partner for us,” he said. “And that’s what I look for in a security provider – a long-term partnership. We’re very pleased with the solution from Cook Security Group, Hanwha Techwin, and Genetec and we look forward to completing all phases of the project.”
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Avigilon Corporation, a Motorola Solutions company, announces that the New Bedford Housing Authority (‘NBHA’) in Massachusetts, USA has selected Avigilon video security solutions to help improve safety and reduce crime within its community. With close to 1,750 federal public housing units and 748 state aided units, the NBHA services over 6,000 individuals by providing safe, well-maintained and affordable housing units. New Bedford has faced challenges related to crime, which prompted the NBHA to seek out a security system that delivers actionable results to increase public safety throughout its community. Monitor critical areas The NBHA has deployed a complete Avigilon solution to monitor 13 of its properties throughout the city The NBHA has deployed a complete Avigilon solution to monitor 13 of its properties throughout the city. The system includes more than 125 Avigilon cameras and Avigilon Appearance Search™ technology, which is powered by AI to help enable security officers to quickly sort through hours of video with ease to locate a specific person or vehicle of interest across an entire site or multiple sites that are connected to the same Avigilon Control Center™ client software. “Our goal is to provide a safe environment for our residents and deploying an Avigilon system has allowed us to monitor critical areas more efficiently and respond more quickly,” said Steven Beauregard, executive director of NBHA. Video security solutions “So far, the results are tangible as we’ve made great strides in improving the safety and security of our communities.” “The NBHA is taking significant action to proactively address crime and other security concerns to help protect what matters most: its residents,” said Ryan Nolan, senior vice president, Commercial Operations of Avigilon. “By using our AI-powered video security solutions they are able to increase the effectiveness of their security system and provide a new level of public safety.”
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
How to choose the right solution for video data to enhance security and operational intelligenceDownload
Video surveillance solutions: Manufacturers & Suppliers
- Dahua Technology Video surveillance solutions
- Hikvision Video surveillance solutions
- Seagate Video surveillance solutions
- ComNet Video surveillance solutions
- NVT Video surveillance solutions
- Bosch Video surveillance solutions
- Teleste Video surveillance solutions
- LILIN Video surveillance solutions
- VIVOTEK Video surveillance solutions
- FLIR Systems Video surveillance solutions
- Milestone Video surveillance solutions
- Vicon Video surveillance solutions
- IDIS Video surveillance solutions