Video surveillance solutions
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowe...
PSA, a consortium of professional systems integrators, announced the addition of Razberi Technologies to the partners in its Managed Security Service Provider (MSSP) programme. The MSSP programme is designed to help systems integrators diversify their service offerings and realize the full potential and benefits of a managed services business model. “Razberi helps integrators secure video surveillance networks and Internet of Things (IoT) devices against cyber attacks,” said Dan Dun...
CentralSquare, which holds a market position in public safety software, announced that it has entered into a partnership with Genetec Inc., the global provider of video surveillance software and a provider of technology for unified security, public safety and operations. The partnership brings together CentralSquare’s broad and unified Public Safety Enterprise and Pro suites and flagship products from Genetec, including Genetec Citigraf™ and Genetec Clearance™. Combining these...
The advances in video analytics – including improved classification, accuracy and speed – were unveiled at a Global Partners Summit of international security and video surveillance professionals, hosted by IDIS in Seoul, South Korea. The three day event, attended by senior executives from security distributors from 23 countries, focused on how IDIS is responding to market trends and needs, developing end-to-end solutions, including specialist technologies for a range of vertical mar...
Traka, the provider of intelligent management solutions for keys and equipment, is at the International Corrections & Prisons Association (ICPA)’s annual conference, presenting a new solution for distributing medications safely, securely and accurately within prison environments. Exhibiting in partnership with the pioneer in prison and community corrections software applications provider Unilink, Traka will be demonstrating its specialist medication distribution lockers, designed to m...
Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating at Security Canada Central, Toronto, Ontario, from 23rd to 24th October 2019. Matrix will be showcasing its video surveillance and people mobility management solutions at Security Canada Central. Time-attendance domain Matrix is known for offering technology driven, innovative, futuristic solutions catering to diverse and complex deployments especially for the SMB, SME and large enterprises. Matrix C...
BCDVideo announced the landing of the company’s 100,000th video surveillance recording appliance. The pioneer in video data infrastructure and appliances for the physical security industry is celebrating 20 years in the computer industry, with over a decade in the video surveillance arena. The multinational hardware manufacturer currently records video in 75 countries worldwide under the BCDVideo brand, as well as through over 30 OEM software and camera partners, for whom they private-label systems. The 100,000th system installation was a Genetec™ StreamvaultTM video appliance which will be used in the management of surveillance at an enterprise customer site in the United States. BCDVideo is trusted in purpose-built video surveillance recording appliances and infrastructure. The company’s innovative video surveillance solutions portfolio includes IP video recording servers and storage, revolutionary Hyperconverged Infrastructure (HCI-VS), and network architecture. “We are proud to provide innovation to some of the most influential names in the security industry. This mutual brand trust allows us the partnership to provide and record the video surveillance at marquee companies all over the world.” says BCDVideo’s Chief Executive Officer Jeff Burgess. CRN Magazine named BCDVideo one of North America’s top Technology Solutions Providers and Inc. Magazine designated BCDVideo as one of the ‘fastest-growing private companies’ in the U.S. Also in 2019, the company was honored in as one of the “Best Places to Work in Illinois.”
Dahua Technology, a video-centric smart IoT solutions and service provider, held a press lunch at La Gradona Grupo Puerto Madero, Madrid, as a part of the Dahua Technology Partner Day. Hosted by Mr. Jiaqi Gao, Marketing Director of Overseas Business at Dahua Technology, and attended by 9 distinguished media entities from both inside and outside the security industry including Seguritecnia, Peldaño, Globb TV, Innovadores, and Digital Security Magazine, the press lunch provided a good opportunity to share the latest market trend and technological advancement in the industry. Mr. Jiaqi Gao made a speech before lunch, during which he explained the development trend of the modern security industry, and presented Dahua Technology’s advantages in this time. According to a report by MarketsandMarkets, the IoT in smart cities market is projected to grow from USD 79.5 billion in 2018 to USD 219.6 billion by 2023 at a Compound Annual Growth Rate (CAGR) of 22.5% from 2018 to 2023. It requires tight integration and collaboration of chip supplier, device manufacturer, application developer, cloud computing, big data technology etc. Video-centric IoT solution Dahua Technology aims to create richer smart solutions to satisfy more customers’ needs With the development from a device oriented to an application/solution oriented industry, understanding the business challenges, tailoring the solutions to address these challenges and monetising its data, have become essential parts of the value chain, thus, an open system and collaboration between different players in the value chain are a must. "Dahua Technology, as a video-centric smart IoT solution and service provider, has multi-dimensional data collection technologies, know-how and expertise in monetising and utilising video centric data, and continuously strong R&D capabilities,” said Mr. Gao. By actively participating in the formulation of agreements on industry standards like ONVIF, exploring hardware ecosystem by joining OSSA, and opening up its own hardware platform such as DHOP, Dahua Technology is slowly but steadily building the open technology structure. It introduced DIPP (Dahua Integration Partner Program) protection scheme in 2017 in order to ensure that its partners receive corresponding technological benefits and commercial profit. By doing so, Dahua Technology aims to create richer and more improved smart solutions to satisfy more customers’ needs, as well as to grow and achieve mutually with its partners in this ever growing industry.
The appointment of Ritesh Deokar is a strategically important move for the company, adding valuable experience and expertise which complement Milestone Systems’ ambitious expansion plans in the region. Ritesh joins the company from a senior management position at Larsen & Toubro Infotech (LTI), where he was responsible for Global Alliances. Prior to that, he was employed as National Alliance manager at Wipro Limited, and has extensive experience working within the ICT sector in India. His diverse background in both technology and security will be of significance to Milestone Systems’ growth in the region. Converged security and technology skillset Jordan Cullis, Director for APAC at Milestone Systems, said of the appointment: “The fact that Ritesh brings a converged security and technology skillset to the company fits perfectly with our needs.” Video management has evolved far past the point where it exists purely as a standalone technology" “Video management has evolved far past the point where it exists purely as a standalone technology, and to fully harness the power of an open VMS platform like Milestone Systems, our leaders need to understand and work with the myriad of technologies that integrate with our solutions.” Ritesh received his MBA from Nagpur University, and is fluent in four languages: Hindi, English, Kannada and Marathi. He will be based in Bengaluru. Video management and surveillance industry Milestone Systems has committed to an ambitious growth strategy in the region, backed by a global plan to increase their innovation capacity by 45 percent. “I am very excited to come to a leading global company like Milestone Systems, at a time when there is so much happening in the video management and surveillance industry in India.” “There is enormous potential for Milestone Systems’ open platform VMS solution and my extensive contacts across the IT and security markets here will certainly give us some great scope to forge new alliances, build new solutions and really take the company forward across the region,” said Ritesh Deokar.
Luxriot Video Management System (VMS) software was introduced to the market in 2005. To get its market share Luxriot used various critical USPs; something that is not offered or claimed by any other competitive products. Quality, stability and set of features can't be called USPs, as these are mandatory and market driven aspects of any product. What is so unique about this Enterprise Edition? Even though customers only pay the standard fixed fees, they can obtain a license that sets no software limitations on the number of channels they could use on the server (of course, hardware limitations apply). Complete surveillance ecosystem solution One might say – everyone claims superior support! How is Luxriot’s different? It's easy to explain. Luxriot’s technical support is easy to reach and swift in response, where its availability is not related to the package purchased. Luxriot provides detailed support to all its partners and provides top level business relation flexibility. All customers are always VIP for Luxriot. The Unlimited Edition holds the same advantages found in the Luxriot VMS Enterprise Luxriot Evo S offers the modern and feature-packed analogue of the Luxriot VMS. The Unlimited Edition holds the same advantages found in the Luxriot VMS Enterprise. Armed with 64-bit performance, the software maximises hardware utilisation at full specs. And the Luxriot Evo Global, an enterprise-level version of the software, offers a complete surveillance ecosystem solution with an intelligent central server governance hierarchy for organisations of any scale, even when distributed across multiple sites. Stand-alone server solution Luxriot’s stand-alone server solution still offers Enterprise Edition with no software limitations on number of channels per server. But what is more important, is that they hold on to their motto: video surveillance solution is not only about top performing product, but also about superior customer service. As market share of Luxriot in Asia is constantly growing, it is critical for them to be able to maintain the same level of service that helped them to succeed. Due to this, they are proud to announce the launch of Luxriot's new office in Shenzhen, China; that will be responsible for APAC region. Ensuring their worldwide customers and partners will be able to enjoy the same superior customer support that Luxriot is proud to provide.
In a boost for video project implementations across Europe, all IDIS cameras, network recorders and accessories are now available to partners with next day delivery with the opening of a new distribution and after-sales service centre in the Netherlands. IDIS, which is Korea’s in-country surveillance manufacturer, is opening the new distribution centre to improve customer service and accelerate growth by supporting local distributors in each country through much faster delivery times, with all stock to be available within days, not weeks, even for the largest projects. “Our expanded operation means a huge step up in customer service,” says Joon Jun, President of the Global Business Division, IDIS. “It can take a long time for buyers to choose a new video solution, but once they decide, they want it very quickly – we will now be able to do that, right across Europe, and in most cases we will dispatch same day for orders placed before midday.” Strong position in multi-site retail We can guarantee much faster product delivery and quicker equipment repairs” The company saw 22% year-on-year growth across Europe last year and has developed a strong position in multi-site retail, including fashion chains, high-end boutiques and eating out sectors. IDIS has also built on its success during the 2018 Russian World Cup, when two of the main stadiums used IDIS video tech, with more European stadia now turning to IDIS surveillance to improve visitor and staff safety and manage the risks faced by major event venues. “For most applications customers don’t want to wait for service repairs or equipment upgrades,” added Joon Jun. IDIS distributors will now be able to better support their European integrator partners to win new projects with immediate rolling stock delivery as well as improve service levels with product refurbishments and repairs which will no longer need to be shipped to Korea. Regular firmware updates We’re backing up with after-sales service to increase service-levels for their customers” “Once a customer chooses an end-to-end IDIS solution they are fully protected and supported at every stage, including for maintenance, with regular firmware updates to protect against evolving cybersecurity risks, for scaling up and system expansion, and for ongoing free user training. Now we can also guarantee much faster product delivery and quicker equipment repairs.” James Min, Managing Director, IDIS Europe added: “IDIS is already well known for the industry-leading IDIS Ultimate Warranty and first line local technical support. We have our own dedicated tech support desk here in Brentford, London, as well as offering first-line technical support in multiple languages via our network of distribution partners throughout mainland Europe.” He adds: “We’re now backing this up with an additional layer of after-sales service in the Netherlands that will allow our national distributors and their system integration partners across Europe to increase service-levels for their customers.”
Custom Electronic Supply, a wholesale distributor of security electronics based in San Jose, California, was acquired on August 30th, 2019 by security distribution veterans Jason Dennis, Lannie Green, Matthew Green, and Danny Cranford. Dennis, along with Matt and Lannie Green, has deep distribution roots. They are the former owners of San Antonio-based Security General International, a privately-held solutions provider specialising in the distribution of emerging technology products and connectivity solutions, established in 1984. They sold Security General International to Tri-Ed in 2012. Cranford also brings to the venture very extensive industry experience and has worked in security distribution since 1987. Access Control and Integrated Systems He also served as co-owner of Security Data & Cable (SD&C) since its inception in 2001 before selling to Tri-Ed in 2010. The acquisition of Custom Electronic Supply was an amicable one, catalysed by the retirement of one of its two owners, Charlie Cohen. Dave Kelly, its other previous co-owner, will continue to oversee all California operations and the company will continue to do business as Custom Electronic Supply. Wholesale security distribution has undergone many changes over recent years" All employees will also remain on-board, making the transition a seamless one for loyal customers who have come to rely on Customer Electronic Supply as their distribution partner for many years. Product lines span Access Control, Burg, Fire, Video Surveillance, Integrated Systems, Low Voltage Residential Systems, and Installation Tools and Supplies. Personalised service For the new owners – Jason Dennis, Lannie Green, Matthew Green, and Danny Cranford – the time to return to their distribution roots seemed spot on. “Wholesale security distribution has undergone many changes over recent years,” notes Jason Dennis. “My partners and I were not actively looking to get back into distribution. But, we’ve been hearing a lot of dissatisfaction from people in the industry recently." "Customers, employees and vendors have all been voicing their desire for a new alternative. We felt the time was right to offer one and provide the good, old-fashioned personalised service that should never stop being synonymous with a trusted distribution partner,” he adds. “Acquiring Custom Electronic Supply was the right decision that came along at the right time.” The four partners who, together own Custom Electronic Supply under the name Lone Star Systems Supply LLC, look forward to announcing additional new branch openings in the near future.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
Video is a more common feature of security systems than ever before, driven by implementation of Internet Protocol (IP) networks. In addition, various computer analytics systems are now being implemented as a matter of course. The combination of the two trends is changing – and expanding – the operation of security operations centers (SOCs). Intelligent security operations "Intelligence is central to the next evolution of security", says Alan Stoddard, Vice President and General Manager, Situational Intelligence Solutions, Verint. An architecture is needed that can gather information from multiple devices and process it using intelligence and analytics engines. Cross-domain analytics create a higher level of security. Exposing data to best-in-class analytics provides information tailored to each security operator" “Exposing data to best-in-class analytics provides information tailored to each security operator,” says Stoddard. “There is so much data, and people need to react to it.” The result is the emergence of intelligent security operations centers (iSOCs). Consider, for example, any recent security event: “As people look to understand and get ahead of these incidents, how do they synthesise information? How do they move ahead from response to prevention?” asks Stoddard. Video-centric command-and-control Because of the expanding uses for video, Stoddard sees movement in the industry toward video systems being the focal point for integration of data sources into a command-and-control environment. “Everyone is visual, and video provides a mechanism to understand your environment,” says Stoddard. “Video-centric command-and-control marries the value of video with a map that is easy to navigate and understand. He adds,"Video is pulled in from each location, and various subsystems are integrated into a unified environment. The video management system (VMS) is a natural integration point.” To serve the combined emphasis on analytics and video management, Verint has introduced its VMS One system, a single product that combines video and integrated command-and-control for iSOC environments. The new product serves a need in the marketplace to manage diverse data streams, to analyse data for greater intelligence and to automate workflows. Integration with third party VMS VMSOne combines a VMS with a command-and-control system and is targeted to large facilities and campus-like environments with SOCs. Examples include transportation hubs, large manufacturing sites, critical infrastructure, safe cities and higher education. For even larger, enterprise-type customers with multiple locations and plenty of subsystems, Verint offers its Situational Awareness Platform, which can integrate with third party VMSs and other systems. The scalable system for very high-end customers can manage tens of thousands of devices and subsystems. VMSOne, which had a preliminary launch at ISC West and is featured at the 2019 GSX show in Chicago, is targeted to the next lower tier of customers. Customer shipments will begin in September 2019. Verint’s Situational Awareness Platform can integrate with third-party VMSs Physical and cyber security Increasingly, the security needs of end users are being converged, says Stoddard. They encompass information technology (IT), physical security and cyber security, combined with a corporate security officer (CSO) in charge of decision-making. More sensors and subsystems create the possibility of data overload for security operators, and more intelligence and analytics are tools to filter and manage that data and present it in useful form for better decision-making. Verint recently hired Jeffrey Lewis as Vice President, Marketing, to lead its marketing effort from an IT-centric perspective and talk to customers in a new way about the concepts of converged security. New technologies and a more converged environment create higher expectations and greater demands on the integrator/installer community, too. In response, Verint has launched a VIP Partner program to develop stronger and closer relationships with a select group of integrators. These “VIPs” are the “best of the best” – the most capable in the industry, knowledgeable about new technologies, and able to provide more value to end-customers. VIP Partner program Dealers are screened based on modest volume sales requirements and whether they have the right skillsets, technical capability and training. There are currently several dozen VIP partners, who “lead with” Verint solutions where they make sense in the marketplace. The VIP Partner initiative complements Verint’s other partner channels. Providing another tool to manage the flow of data in an organisation, Verint recently acquired Nowforce, a small Israeli company, that provides an enhanced computer-automated dispatch system. Verint offers the integrated dispatch and response capability as either a stand-alone product or as part of the larger Situational Awareness Platform. Situational Awareness Platform Getting ahead [of security threats] requires looking at social media and other data sources"“It allows SOCs to take information in and handle response in an integrated fashion,” says Stoddard. “It also extends the security workforce, enabling customers and employees to take part in the security environment.” Stoddard adds, “Getting ahead [of security threats] requires looking at social media and other data sources, information on site, and creating a holistic security view for greater understanding,” says Stoddard. Verint’s Situational Awareness Platform integrates with third-part systems that track social media, such as Liferaft Navigator, NC4 and Dataminr,” Nowforce creates 360 degrees of control, extends the control center into the virtual workforce, and enables everyone to be managed. Information such as visuals and maps are pushed to security personnel on smart phones, and security officers get to the scene faster.
An interim Federal Acquisition Rule (FAR) detailing how the U.S. Federal government will implement a ban on government use of video surveillance products from Chinese manufacturers has been released just days before the August 13, 2019, deadline for the ban to take effect. The interim rule will take effect immediately; it notes there are "urgent and compelling reasons… to promulgate this interim rule without prior opportunity for public comment". After the interim rule is published in the Federal Register, 60 days will be allowed for public comments to be submitted (tag comments and correspondence ‘FAR Case 2018-017’). The final rule will follow. The agencies issuing the interim rule are the Department of Defense (DoD), the General Services Administration (GSA), and the National Aeronautics and Space Administration (NASA). Banning Chinese video surveillance equipment The interim rule provides details about implementation of Section 889(a)(1)(A) of the NDAA for fiscal year 2019The interim rule provides details about implementation of Section 889(a)(1)(A) of the National Defense Authorization Act (NDAA) for fiscal year 2019, which the President signed into law on August 13, 2018, to take effect a year later. It bans government uses of telecommunications and video surveillance equipment produced by Hikvision and Dahua, among other companies. The interim rule also applies to telecommunications equipment produced by Huawei Technologies Company or ZTE Corp. (or any subsidiary or affiliate). Huawei manufactures HiSilicon chips widely used in video cameras. The interim rule requires inclusion of a clause prohibiting the listed telecommunications and video surveillance services on solicitations and/or resulting contracts that occur on or after August 13, 2019. Contractors who identify covered equipment during the performance of a contract are required to report it within one business day; and to report mitigation actions within 10 business days. The requirement is included in contracts with subcontractors. Identifying telecommunications equipment The rule requires submission of a ‘representation’ with each offer (government bid) to identify any covered telecommunications equipment or services that will be provided to the Government. The interim rule states: “DoD, GSA, and NASA recognise that some agencies may need to tailor the approach to the information collected based on the unique mission and supply chain risks for their agency.” The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period There is an option for contractors to "represent annually whether they sell equipment, systems, or services that include covered telecommunications equipment or services". A ‘no’ answer then applies to any contracts during the year. If a contractor answers ‘yes’, they are required to specify that each individual bid does not include the covered equipment. The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period. Waivers require a compelling justification, that the equipment be listed/reported, and that a phase-out plan is implemented. The Director of National Intelligence can also provide a waiver. Prohibits purchase of COTS items The interim rule also applies to purchase of commercial off-the-shelf (COTS) items: "Th[e] level of risk is not alleviated by the fact that the equipment or service being acquired has been sold or offered for sale to the general public... nor by the small size of the purchase." It prohibits ‘micro-purchases’ of covered products and services delegated by agency heads. The interim rule covers the NDAA Section 889(a)(1)(A), which is the ‘Chinese ban’ provision. It does not cover the ‘blacklist’ provision [Section 889(a)(1)(B)], which was the subject of a public hearing in July. According to the interim rule: "The prohibition in section 889(a)(1)(B) is not effective until August 13, 2020, and will be implemented through separate rulemaking." The ban also applies to current government installations, and there are questions about whether agencies and departments will comply in time.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbour for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbour in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbour complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analysing people's behaviour. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Central to the Italian motor racing scene, Gruppo Peroni Race organises very high level car championships in the Imola, Vallelunga and Monza Italian racing circuits. For thirty years in the sector, the activity of the Peroni Race Group includes various championships and numerous special events such as endurance tests. When they wanted to open up the racing experience to more members of the public, they turned to a solution using Hikvision products. Partnership with Hikvision and Italec s.r.l The company decided to make its free events more accessible to the public The company decided to make its free events more accessible to the public and asked DirectE20, its historical partner in the audio-video industry, to come up with a solution to broadcast the live video-chronicle on YouTube, Facebook and other social events. They worked in close collaboration with Italtec, distributor of professional security solutions specialised in planning and technical assistance. In order for viewers to be able to experience the sheer thrill of the race, they needed cameras that could follow the high speed action. And due to the unpredictability of European weather, the solution needed to provide great images even in adverse weather conditions and other poor light situations. Speed Dome cameras and network video recorders Italtec chose to design the solution using Hikvision video solutions and products. In particular, they chose the company’s renowned 2MP and 4MP Speed Dome Camera solutions and the 96XX and 77XX series network video recorders (NVRs), together with monitor and keyboard to control the cameras. They chose Hikvision for the high performance of its PTZ products, able to obtain extremely interesting rapid-focus and self-tracking. Video management was entrusted to iVMS 4200, the free Hikvision software. All of these products were brought together in a mobile control room which could broadcast high quality images able to follow cars racing at high speed. The flexibility of the system and the adjustable nature of the cameras meant that they could respond immediately to the action, both automatically and on command from the control room. Camera installation and positioning In order to maximise the viewer experience, during the installation of the products installers needed to pay particular attention to camera positioning. It was essential to capture the images of the vehicles in the approach to curves with different viewing angles, both on arrival and departure of the circuit curve. Alessandro Rossi, Sales Manager of Italtec, has said, "We chose Hikvision for its leadership in the field of high-tech video surveillance. Analysing the professional CCTV market, we received lots of positive feedback from those who have been using the brand for years: we therefore decided to carry out tests, following which we definitively decided to go with Hikvision.” Mobile technology solution Enthusiasts can follow live races and the material collected can be used later to make videos" Gruppo Peroni was also impressed. Sergio Peroni, the organisation’s President, stated, "Thanks to the work carried out by DirectE20, that created the mobile technology solution, today we can collect high quality video material that perfectly meets the needs of our audience. He adds, “Enthusiasts can follow live racing competitions on the circuits and the material collected and filed can also be used later to make videos for advertising or repertoire purposes. We are very satisfied with the technical choices made and above all the results obtained.” Hikvision products delivered a result in the form of an innovative system for audio and video distribution of motor racing at its best, thanks to its simplicity and flexibility. This solution could be used to stream all kinds of sports events in the future.
VuWall, the pioneer in video wall control and AV network management, announces that the Canadian Space Agency (CSA) successfully deployed VuWall's VuScape processor to monitor the launch of the satellites and their trajectory for the RADARSAT Constellation Mission (RCM). Installed by Applied Electronics, VuScape video wall controller shares and manages incoming content to the control rooms' video walls. Managing multiple surfaces and streams of information "The RCM will collect information from multiple satellites that is critical to maritime management, disaster management, and ecosystem monitoring in Canada," said Paul Vander Plaetse, CEO at VuWall. The CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling" "From a single VuScape processor, the CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling. This is an excellent example of how our affordable visualisation solutions can be scaled and tailored to meet the needs of any organisation — from the smallest to the largest and most mission-critical deployments — while adding capabilities that further the value of the system." Performing maintenance and control operations For the project, VuWall's VuScape processor shares the incoming information on the video wall in both mission control rooms and meeting rooms. Control room operators can easily configure and update the layouts as needed on each of the video walls, providing them with at-a-glance information that's vital for performing maintenance and control operations on the satellites that they are mandated to monitor. With a single VuScape processor driving multiple video walls in multiple rooms, the CSA is able to manage the access and control of each individual surface with user profile management, limiting access to view and/or manage video wall content only to authorised personnel.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
The first China International Import Expo was held on November 5, 2018 in Shanghai. As the world's first import-themed national exhibition, it attracted more than 3,600 exhibitors from 172 countries, regions and international organisations, making security a top priority during the event. As an essential force in the global security industry, Dahua Technology has performed outstandingly in assuring the security of many international events such as the Rio Olympic Games, G20 Hangzhou Summit and the 9th BRICS Summit. This time, Dahua Technology has shouldered the security responsibility again with its state-of-the-art products and solutions. Event security Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment The Expo expected a total number of 800,000 visitors, as well as tens of thousands of displayed goods, coming from more than 3,000 companies in more than 130 countries, demanding safety as the top priority in the venue. Integrating data from various departments as well as monitoring the venue and command dispatching became a huge challenge for the security and police personnel. Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment in the core locations of the Shanghai National Convention and Exhibition Center and its surrounding areas, using video AR, face recognition, ANPR, video structuring, intelligent analysis and other technologies to improve the venue’s level of security. Artificial Intelligence solutions In order to further enlarge the area security coverage, Dahua Technology set up video surveillance points in key areas of Shanghai National Convention and Exhibition Center including entrance and exit points of the outer ring, interior area, office buildings, as well the surrounding major passages, plazas, commanding points, subway entrances and exits, pedestrian bridges, etc. In addition to the already pre-installed surveillance equipment, new monitoring devices were also added to make sure that there will be no blind spots and interruptions of the video transmission in the whole area. Panoramic cameras Dahua panoramic cameras installed at the commanding point of the Shanghai National Convention and Exhibition Center employs AR technology in order to achieve omni-directional and no blind spot surveillance. Additionally, the panoramic cameras deployed inside the exhibition center monitor the situation inside the exhibition hall and obtain real-time dynamic information that builds a three-dimensional platform that are visual, controllable and schedulable to facilitate an efficient security operation. Intelligent video analysis system Intelligent video analysis system was built in the exhibition area to classify the acquired data Moreover, intelligent video analysis system was built in the exhibition area to classify the acquired data according to the preset rules and application requirements, such as crowd detection, behavior analysis, map search, etc. This system expands and deepens the application of video information in the efficiency of public security. Furthermore, through the Dahua Deep Learning Series video alert camera, people who would illegally climb over the perimeter fence built within the 4-kilometer area of the exhibition hall would be identified and captured. Dahua face recognition system The Dahua face recognition system deployed at the entrance and exit of the exhibition center could recognise the identity of all visitors in real time by comparing their ID card’s recorded information with the face photo captured by the front-end smart camera. This system did not just improve the traffic efficiency of the entrance and exit points, but also guaranteed the safety and accuracy of the identification of people walking in and out of the venue. High-definition smart cameras Dahua high-definition smart cameras were also set up at the entrance and exit around the transportation hub of the Shanghai National Convention and Exhibition Center to monitor and track high-risk vehicles and people in real-time. This effectively improved the road management and traffic control in the area. Fully structured cameras capturing real-time videos of motor vehicles, pedestrians and non-motor vehicles were deployed in the surrounding area, which also support face and body recognition for a more comprehensive security. Video network platform Video network platform automatically connects the video and image data captured within the area Additionally, a video network platform automatically connects the video and image data captured within the area to the public security command center, creating a resource sharing integration of valuable information. China International Import Expo has facilitated countries and regions all over the world in strengthening economic cooperation and trade, and promoting global trade and world economic growth. Dahua AI solutions has greatly enhanced the prevention and control measures within the key areas around the venue, assuring security during the Expo. Cutting-edge security solutions After the event, Dahua Technology received letters from the Shanghai Public Security Bureau, Qingpu Public Security Bureau, Changning Public Security Bureau, Shanghai Hongqiao Integrated Transportation Hub Emergency Response Center, and other offices, thanking Dahua Technology for its strong support and contributions to the success of the security management during the event. From the Rio Olympic Games to the G20 Hangzhou Summit, from the 9th BRICS Summit to the first China International Import Expo, Dahua Technology always accomplishes various security tasks with high quality and efficiency. With its cutting-edge products and solutions, quality operation services and professional technical team, Dahua Technology will continue to assist more major international events in the future.
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
How to choose the right solution for video data to enhance security and operational intelligenceDownload
Video surveillance solutions: Manufacturers & Suppliers
- Dahua Technology Video surveillance solutions
- Hikvision Video surveillance solutions
- Seagate Video surveillance solutions
- ComNet Video surveillance solutions
- NVT Video surveillance solutions
- Bosch Video surveillance solutions
- Teleste Video surveillance solutions
- LILIN Video surveillance solutions
- VIVOTEK Video surveillance solutions
- FLIR Systems Video surveillance solutions
- Milestone Video surveillance solutions
- IDIS Video surveillance solutions
- Vicon Video surveillance solutions