REDWALL CCTV Video motion detectors (13)
REDWALL SIP-3020/5-IP is a passive infrared detector with creep zone,30mx20m coverage (main area) and 6x9m coverage (creep zone). It is designed to trigger IP video transmission systems and PTZ camera control. This PIR detector provides two independant detection areas in one device.Add to Compare
REDWALL REDSCAN RLS-3060L is a laser scan detector for indoor or outdoor applications and vertical or horizontal mounting, integrated with major VMS providers. It can detect a moving object’s size, speed, and distance from the detector and process that information with a unique algorithm, which results in high reliability detection with minimal false alarms.Add to Compare
REDWALL SIP-4010-IP is a PIR detector for mid-sized outdoor areas. This passive infrared detector features intelligent PIR detection system, automatic sensitivity management to ambient temperature and light, advanced detection algorithm, three dual pyro-elements with patented double conductive shielding and independant sensitivity for near and far detection zones. It is designed to enhance CCTV applications.Add to Compare
REDWALL SIP-100-IP is a passive infrared detector for CCTV applications. This PIR detector features automatic sensitivity management to ambient temperature and light, advanced detection algorithm, anti-vandalism functions including anti-masking and anti-rotation function with 3-axis accelerometer and independant sensitivity for creep/ near and far detection zones.Add to Compare
REDWALL SIP-4010WF is a wireless passive infrared detector with 40m x 10m detection area. This PIR detector advanced detection algorithm, three dual pyro-elements with patented double conductive shielding, anti-vandalism functions, anti-rotation function with 3-axis accelerometer, anti-masking function with photo-beam and adjustable alarm interval time.Add to Compare
REDWALL SIP-404 WF is designed for use where a reliable low current detector is required. It has an intelligent detection system that monitors the temperature and illuminance of the environment and automatically adjusts the sensitivity.Add to Compare
REDWALL REDSCAN RLS3060SH is a IP laser sensor for indoor or outdoor intrusion detection applications, vertical (virtual wall) or horizontal mounting, integrated with major VMS providers. It has both intelligent detection analysis functions and adjustable detection algorithm parameters that increase its range of applications. It provides flexible solutions that streamline video surveillance and a wide range of security applications. The REDWALL REDSCAN RLS3060SH IP laser sensor can be installed directly on an IP security network.Add to Compare
REDWALL Redbeam RBM-60QN-IP IP quad beam detector can be integrated with the security network and connected with video management software platforms, to control IP cameras and better manage alarms. Teh REDBEAM is a quad high power bam that combines precise detection capability with increased reliablitiy, providing superior outdoor detection in a smart design.Add to Compare
REDWALL Redbeam RBM-100QN-IP quad beam detector can be integrated with the security network and connected with video management software platforms, to control IP cameras and better manage alarms. Teh REDBEAM is a quad high power bam that combines precise detection capability with increased reliablitiy, providing superior outdoor detection in a smart design.Add to Compare
Browse CCTV Video motion detectors
- Other REDWALL products
- REDWALL Intruder alarm system control panels & accessories
- REDWALL Intruder detectors
Video motion detector products updated recently
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
Cyber threats hit the headlines every day; however digital hazards are only part of the security landscape. In fact, for many organisations - physical rather than virtual security will remain the burning priority. Will Liu, Managing Director of TP-Link UK, explores the three key elements that companies must consider when implementing modern-day business surveillance systems. 1) Protecting more than premises Video surveillance systems are undoubtedly more important than ever before for a huge number of businesses across the full spectrum of public and private sector, manufacturing and service industries. One simple reason for this is the increased use of technology within those businesses. Offices, workshops, and other facilities house a significant amount of valuable and expensive equipment - from computers, and 3D printers to specialised machinery and equipment. As a result, workplaces are now a key target for thieves, and ensuring the protection of such valuable assets is a top priority. A sad reality is that some of those thieves will be employees themselves. Video surveillance system Of course, video surveillance is often deployed to combat that threat alone, but actually, its importance goes beyond theft protection. With opportunist thieves targeting asset-rich sites more regularly, the people who work at these sites are in greater danger too. Effective and efficient surveillance is imperative not just for physical asset protection, but also for the safety From this perspective, effective and efficient surveillance is imperative not just for physical asset protection, but also for the safety of colleagues as well. Organisations need to protect the people who work, learn or attend the premises. A video surveillance system is, therefore, a great starting point for companies looking to deter criminal activity. However, to be sure you put the right system in place to protect your hardware assets, your people, and the business itself, here are three key considerations that make for a successful deployment. 2) Fail to prepare, and then prepare to fail Planning is the key to success, and surveillance systems are no different. Decide in advance the scope of your desired solution. Each site is different and the reality is that every solution is different too. There is no ‘one-size-fits-all solution and only by investing time on the exact specification can you arrive at the most robust and optimal solution. For example, organisations need to consider all the deployment variables within the system’s environment. What is the balance between indoor and outdoor settings; how exposed to the elements are the outdoor cameras; what IP rating to the need? A discussion with a security installer will help identify the dangerous areas that need to be covered and the associated best sites for camera locations. Camera coverage After determining location and coverage angles, indoors and outdoors, the next step is to make sure the cameras specified are up to the job for each location. Do they have the right lens for the distance they are required to cover, for example? It is not as simple as specifying one type of camera and deploying it everywhere. Devices that can use multiple power sources, Direct Current, or Power over Ethernet well are far more versatile You have to consider technical aspects such as the required level of visual fidelity and whether you also need two-way audio at certain locations? Another simple consideration is how the devices are powered. Devices that can use multiple power sources, Direct Current or Power over Ethernet as well are far more versatile and reliable. Answers to these questions and a lot more need to be uncovered by an expert, to deliver a best-of-breed solution for the particular site. 3) Flexibility breeds resilience Understanding exactly what you need is the start. Ensuring you can install, operate and manage your video surveillance system is the next step. Solutions that are simple to install and easy to maintain will always be favoured - for example, cameras that have multiple sources of power can be vital for year-round reliability. Alongside the physical aspect of any installation, there is also the software element that needs to be considered. The last thing organisations need is a compatibility headache once all their cameras and monitoring stations are in place. Selecting cameras and equipment with the flexibility to support a variety of different operating systems and software is important not just for the days following the installation, but also to future-proof the solution against change. Easy does it Once the system is up and running, the real work of video surveillance begins. Therefore, any organisation considering deploying a system should look to pick one that makes the day-to-day operation as easy as possible to manage. And again - that is all about the set-up. Cameras can also provide alerts if they have been tampered with or their settings changed The most modern systems and technology can deliver surveillance systems that offer smarter detection, enhanced activity reporting so you learn more about your operations, and also make off-site, remote management easy to both implement and adjust as conditions change. For example, camera software that immediately notifies controllers when certain parameters are met - like motion detection that monitors a specific area for unauthorised access. Cameras can also provide alerts if they have been tampered with or their settings changed without proper authorisation. Remote management of HD footage What’s more, the days of poor quality or unreliable transfer of video are long gone. The high-quality HD footage can be captured, stored, and transferred across networks without any degradation, with hard drives or cloud-based systems able to keep hundreds of days of high-quality recordings for analysis of historical data. Finally, the best surveillance solutions also allow for secure remote management not just from a central control room, but also from personal devices and mobile apps. All this delivers ‘always-on’ security and peace of mind. The watchword in security Modern video surveillance takes organisational security to the next level. It protects physical assets, ensures workplace and workforce safety, and helps protect the operations, reputation, and profitability of a business. However, this is not just an ‘off-the-shelf purchase’. It requires proper planning in the form of site surveys, equipment and software specifications, as well as an understanding of operational demands and requirements. Investing time in planning will help businesses realise the best dividends in terms of protection. Ultimately, that means organisations should seek to collaborate with vendors who offer site surveys - they know their equipment best, your needs, and can work with you to create the perfect solution.
Cloud-based technology can reduce IT costs, streamline application management and make infrastructure more flexible and scalable. So, it’s no surprise that cloud video surveillance solutions (also known as video surveillance as a service or VSaaS) are gaining momentum in a big way. In fact, according to recent reports, the VSaaS market is forecasted to increase at a compound annual growth rate of 10.4% by 2025. But some company owners may wonder – what services does a cloud model deliver and is such a solution right for my business? This article aims to help you determine what cloud video surveillance solution is right for your business and the benefits you can enjoy if you decide to deploy a VSaaS solution. Full cloud-based recording vs cloud-managed First, a bit of clarification on cloud video surveillance models, as definitions can vary from provider to provider. A full cloud-based recording solution is one in which both video recording and management are done offsite (for example, cameras streaming directly to the cloud). While this model can be a good option for some, many large enterprise businesses simply don’t have the bandwidth capacity or network resources required to upload all of their videos to the cloud. Even with the bandwidth capacity, this can be a cost-prohibitive model when hundreds or thousands of IP cameras are involved. A full cloud-based recording solution is one in which both video recording and management are done offsite But that doesn’t mean enterprise businesses can’t take advantage of cloud-managed video surveillance. With this solution, video recording and storage happen on your premises (with network video recorders (NVRs) or a video management system (VMS)), but the video management aspect is handled in the cloud by a third-party provider, usually as a subscription-based service. The provider hosts the central video server overseeing your on-premises devices. Some providers also allow you to back up portions of the video to the cloud, so you can store and share video evidence or select clips needed for investigations. This model combines the performance benefits of local recording with the convenience and cost savings of the cloud. Centralised video surveillance solution Perhaps the greatest benefit of using this type of cloud-managed video surveillance solution is centralisation. Because all of your devices are centrally managed in the cloud, you don’t have to travel to a distant location to update a recorder or camera’s software – it’s all done remotely by the provider from a central location. This can save you both time and money, especially since it’s necessary to consistently monitor the configuration settings on cameras and NVRs to ensure they’re correct and functioning properly. If your hardware malfunctions and it isn’t detected immediately, instances of lost video can occur. And business owners know that losing video evidence of theft or fraud could have significant consequences to the efficiency and effectiveness of an investigation. Round the clock monitoring Some providers monitor for changes in cameras’ field of view, so if a camera is blocked or moved, you’ll be alerted With a cloud-managed model, you can rest assured that if a camera goes down or another technical issue arises, the provider will know and will handle it immediately so you can avoid unnecessary truck rolls, which can be costly. Some providers will even monitor for changes in your cameras’ field of view, so if a camera is blocked or moved, you’ll be alerted right away. This type of around-the-clock monitoring eliminates your need for an in-house data centre and the IT staff necessary to maintain the video system. This is particularly important if you don’t have the infrastructure or the personnel to host your own video networking equipment. You can also save time with the deployment of your video surveillance solution since your provider will get your system up and running quickly. There’s no need to worry about setting up or configuring the central server or any application software – it’s all taken care of by your provider. Flexible and cost-effective In many cloud-managed solutions, you can also skip the large upfront capital cost of a video surveillance investment and pay a monthly fee for all of these services. This is particularly helpful if it’s difficult for your organisation to make large capital investments. You may or may not have to invest in onsite devices (cameras and NVRs), depending on the provider you choose. Some providers will allow you to finance your hardware, while others will want you to purchase it upfront. Many cloud providers also offer robust web clients for viewing video and conducting investigations remotely Many cloud providers also offer robust web clients for viewing video and conducting investigations remotely. These do not require any local downloads, which saves you time and money by avoiding the need for additional IT resources. It also alleviates worrying about whether or not you have the latest version, as the clients are automatically updated. And if you don’t want to spend a lot of time on video analysis, some cloud-managed models offer predefined reports on what’s most important to you. For example, a list of potentially suspicious transactions matched with video – so you can quickly scan to investigate. Getting the right solution Determining whether a cloud-managed video surveillance solution is right for your business is a big decision involving many factors, including your business’s size, bandwidth, and network infrastructure, and overall budget for physical security. By considering the points above, the hope is that you can more easily determine which model is best for your business.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalisation and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitisation, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-colour 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behaviour analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behaviour analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
OPTEX, the global sensor manufacturer, has announced its award-winning REDSCAN PRO LiDAR sensors are now fully integrated with Genetec Security Center, to provide enhanced perimeter protection for the highest security sites. OPTEX - Genetec partnership The announcement follows a long period of engagement between the two firms, even prior to the launch of the latest OPTEX sensor series, to ensure the data and algorithms could be fully integrated and interpreted by the Genetec Security Center platform. By integrating the two technologies, a series of advanced features, exclusive to Genetec, have now been unlocked. Genetec is the only company to leverage the live X&Y coordinates, provided by the REDSCAN LiDAR, to create critical area mapping and video tracking, including advanced intelligent features, such as automatic target path fusion. This feature automatically merges single targets detected by multiple sensors, together as one, to help reduce the number of events presented via the Genetec Security Center platform, to the security staff and make them more relevant. REDSCAN PRO LiDAR and Genetec Security Center integration The integration of the OPTEX REDSCAN PRO series into our Security Center is a game-changer for perimeter security" David Lenot, Critical Infrastructure Practice Lead at Genetec, said “The integration of the OPTEX REDSCAN PRO series into our Security Center is a game-changer for perimeter security. With detection, tracking and video verification, all in one device, it’s not only more efficient and cost-effective, but also customers can expect higher levels of security and surveillance than ever before.” Automatic tracking of targets and camera handover is also enabled, providing a complete, visual audit trail of events through a single interface. Additionally, the REDSCAN integration with Genetec can be used specifically in vertical mode, to precisely map areas on a virtual wall. It could be mapping each window of a building façade, for instance, or each painting on a museum wall, to enable any intrusion or alarm to be quickly located and visualised. Strong working partnership Tomohiro Tsuji, General Manager at OPTEX, said “The shared beliefs and principles between OPTEX and Genetec have helped to build a strong working partnership. At OPTEX, we like to work in close collaboration with our partners, to deliver the very best solutions.” He adds, “We have worked closely together with Genetec for a number of years, with a clear focus on innovation and integration of technologies to provide enhanced security solutions for our customers. Our latest collaboration enables a deeper level of integration between our technologies, delivering a truly advanced, secure and agile perimeter protection solution.” REDSCAN Pro series The REDSCAN Pro series, which includes two models, the RLS-3060V with a range of up to 30x60 m (approx. 100 x 200 ft.) and the RLS-50100V with a range of up to 50x100 m (approx. 165 x 330 ft.), provides highly accurate detection outdoor and indoor, without any ‘gaps’ or the detection reliability ‘fading’ with range. The rectangular detection patterns provide excellent coverage for virtual wall applications and for virtual planes to cover open areas, ceilings and roofs. Its innovative panoramic camera module means detection can be visually verified, through pre- and post-event images, as well as video stream footage.
OPTEX, the global sensing and detection manufacturer, has expanded the offering of its range of award-winning Intelligent Visual Monitoring Solution with the launch of a new 12-channel Visual Verification Bridge in Europe and Africa. The new 12-channel Bridge, powered by CHeKT, enables up to 12 ONVIF-compatible cameras and alarms to be managed through a single device, making it ideal for larger sites such as major depots and warehouses with constant activity 24/7. The choice of a four and now 12-channel device gives greater flexibility to customers managing multiple sites with multiple devices. Visual monitoring solution The Intelligent Visual Monitoring solution gives the ‘power of sight’ to monitored alarm systems, meaning triggered alarms can be visually verified within seconds and responded to accordingly. The OPTEX Bridge is the hardware device (gateway) that is physically connecting the indoor and/or outdoor intrusion sensors or the panic buttons with the IP cameras on site. It can work with any legacy equipment as well as new systems. It provides a complete audit trail of activity and can detect when a camera is not working (i.e. when it has dropped out of the network), and report the fault, thus ensuring security is not compromised. Cloud-hosted platform Monitoring stations have the ability to provide an easy-to-install and cost-effective visual verification service It communicates via a gated Cloud portal with the Alarm Receiving Centre (ARC) or monitoring station in the appropriate ‘language’, having integrated with all major monitoring software platforms. It will, in effect, work with virtually any intruder alarm technology, or any alarm device with a relay output and any ONVIF camera to deliver one seamless visual verification solution. Monitoring stations have the ability to provide an easy-to-install and cost-effective visual verification service to residential and commercial sites; the Bridge can be installed and working within the hour. The Cloud-hosted platform also allows a stronger collaboration between the ARCs and the home/business owners by having the ability to share video clips to confirm the alarms while respecting any privacy guidelines through its bespoke privacy feature that only end-users can release. Monitored alarm systems Ben Linklater, Commercial Director at OPTEX Europe, says the new 12-channel Bridge gives more options to both installers and monitoring stations: “Since launching our Intelligent Visual Monitoring solution last year, the demand for visual verification has continued to grow.” Most monitored alarm systems are ‘blind’, so the ability to add video and see exactly what is going on has significant benefits. “The 12-channel Bridge complements the four-channel Bridge and gives more options to installers and operators to suit monitored security systems of different sizes and configurations.”
Related white papers
Choosing the right storage technology for video surveillance
Simplified security for utilities & critical infrastructure
How security systems ensure healthy workplaces during COVID and after
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download
City of Chattanooga deploys Genetec Security Centre and Stratocast in public-private policing initiative
Hanwha Techwin provides cameras, NVRs and WAVE VMS to secure US-based facilities of Round1 Entertainment
- City of Chattanooga deploys Genetec Security Centre and Stratocast in public-private policing initiative
- Hanwha Techwin provides cameras, NVRs and WAVE VMS to secure US-based facilities of Round1 Entertainment
- G4S helps protect chemicals at Synthomer’s operational centre in Czech Republic
- The Star of Hope Mission relies on Hanwha Techwin cameras and Wisenet WAVE to secure facilities for the homeless