Visimetrics CCTV Video motion detectors(1)
Browse CCTV Video motion detectors
Video motion detector products updated recently
The global pandemic has triggered considerable innovation and change in the video surveillance sector. Last year, organisations around the globe embraced video surveillance technologies to manage social distancing, monitor occupancy levels in internal and external settings, and enhance their return-to-work processes. Forced to reimagine nearly every facet of their operations for a new post-COVID reality, companies were quick to seize on the possibilities offered by today’s next-generation video surveillance systems. Whether that was utilising motion sensing technologies to automatically close doors or switch on lighting in near-deserted office facilities. Or checking if people were wearing masks and adhering to distancing rules. Or keeping a watchful eye on streets and public spaces during mandated curfew hours. Beyond surveillance and monitoring use cases, organisations also took advantage of a raft of new Artificial Intelligence (AI) applications to undertake a range of tasks. Everything from automating their building management and optimising warehouse operations, to increasing manufacturing output and undertaking predictive maintenance. Behind the scenes, three key trends all contributed to the growing ubiquity of video surveillance observed in a variety of government, healthcare, corporate, retail, and industry settings. Video surveillance takes to the Cloud Last year the shift to digital working led organisations to rapidly embrace cloud-enabled services, including cloud-hosted Video Surveillance As A Service (VSaaS) solutions that provide tremendous economies of scale and flexibility. Alongside significant cost savings, these solutions make it easier for organisations to enhance their disaster recovery and manage their video surveillance estate in new and highly effective ways. Surveillance cameras with audio recording were used more than 200% by customers between 2016 and 2020For example, in addition to enabling remote access and maintenance, today’s cloud-powered systems eliminate any need to invest in local storage technologies that all too often fail to keep pace with an organisation’s growing data storage requirements. Indeed, data from our worldwide customer base survey reveals how in 2020 an impressive 63% of organisations had abandoned using any on-premises storage option and were instead only storing all their video surveillance recordings and data in the Cloud. A deeper review of the global stats shows that the average cloud recording retention period for this stored data was 28.2 days, with organisations in Asia topping the global average at 38 days – 33% higher than was observed in any other region. Improvements in bandwidth and scalability engendered by the Cloud have also helped boost the growing utilisation of audio recordings in addition to visual image capture. Indeed, our research found the number of surveillance cameras with an audio recording facility used by customers jumped more than 200% between 2016 and 2020. Making sense of Big Data The enhanced ease of connectivity and scalable bandwidth made possible by the Cloud is stimulating more companies to connect a lot more video surveillance cameras to their networks. The top motivation for doing so is to generate live metrics and data that can be utilised to deliver enhanced business insights and operational intelligence. In recent years, a rich choice of video analytics solutions have been developed for a variety of industry verticals. The range of functionalities on offer is impressive and covers a variety of applications. Everything from making it easy to classify and track objects and behaviour patterns in real-time, to undertaking anomaly detection, or generating predictions based on past and present events/activities. Data collected via today’s cloud connected cameras can now also be used to feed deep learning training and AI analytics, utilising the unparalleled virtualised processing capacity of the Cloud to convert Big Data into usable information quickly. By integrating this information with data from other enterprise data capture systems, organisations are now able to gain a 360-degree view of their operations – in almost real-time. IT is now in the driving seat No longer the sole preserve of on-site security staff, the wider application and business use of video surveillance means that IT is increasingly taking the lead role where the management and control of these systems are concerned. IT is asked to integrate video surveillance into key enterprise platforms to generate the data that business leaders need Aside from the fact that IT has a vested interest in addressing the cybersecurity implications that come with attaching a growing range of IoT devices to the enterprise network, they’re also increasingly being asked to integrate video surveillance into key enterprise platforms to generate the data that business leaders need. As organisations expand their integration of video with other business applications, such as point of sale, access control, process control and manufacturing systems, this trend is only set to accelerate. Looking to the future Right now, the video surveillance industry is at a key tipping point, as video systems become increasingly strategic for enabling the enterprise to boost productivity, stay compliant, and fulfil its obligations to protect employees and customers. As the technology’s contribution to enhanced data-driven decision-making and problem solving continues to increase, expect the adoption of IP connected video cameras to burgeon as organisations look to capture more data from their day-to-day business operations.
While COVID-19 caused widespread disruption and many challenges for businesses, its sudden arrival prompted some very quick decision-making around how to maintain operations. For some businesses, cloud-based video conferencing solutions provided a welcome alternative to meeting face-to-face. A year on and it seems that this sudden and mass adoption of cloud has accelerated a digital transformation process in other departments. Physical security too is increasingly moving to the cloud in the form of hosted solutions, where Video Surveillance as-a-Service (VSaaS) is providing comprehensive protection across a range of industries and sectors. To better understand the impact of this migration to the cloud, hosted security provider Morphean commissioned a survey of 1000 senior decision-makers across the UK, Germany and Sweden, working in HR, facilities management, IT and security. As well as ascertaining purchasing intent around hosted security applications among a broad spectrum of buyers, the results would provide key indications around the abilities of cloud to benefit organisations in regard to both security and business operations. An increasing urgency around VSaaS and ACaaS adoption Low costs, flexible scalability, demand for real-time and remote access to security data are key to the adoption of hosted solutions Survey results revealed that 51% of senior decision-makers are currently using cloud-based video surveillance (VSaaS) and/or a door entry/access control system (ACaaS). This represents a 3% increase in comparison to responses from a 2019 survey (48%), and broadly reflects projected growth in the physical security market from USD $93.5b in 2020 to USD $120.3b by 2025 at a CAGR of 5.2%. Low costs, flexible scalability and demand for real-time and remote access to security data are key to the accelerated adoption of hosted solutions in the current climate. A significant 70% of respondents agreed that the pandemic had actually increased the necessity/urgency for businesses to adopt VSaaS and ACaaS, with IT Services revealed as the sector with most respondents strongly or somewhat agreeing (82%), followed by Security (73%). Results highlight a hosted physical security market which is in a strong position for 2021. Physical security utilising the cloud can unlock many security and business benefits for the modern organisation as it faces many new challenges. Business optimisation and operational insights The benefits of VSaaS and ACaaS prompted Morphean to examine what areas of the business were optimised, or in need of improvement. 43% of those surveyed stated that data/information security was the most optimised aspect of their company. The total number of respondents who indicated that physical security was already optimised had risen by 4% since our 2019 survey, to 27%. It was those working in IT who saw the greatest disparity in security-related optimisation, with far fewer recognising that physical security was optimised (28%) compared with data/IT security (55%). This may point to an opportunity to increase physical security optimisation to be on par with data/IT security. 95% of those surveyed agreed that if an existing security system could deliver insights beyond security to assist decision making it would influence adoption. It is clear that the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. As an example, consider an office environment where access control and video data can be used to determine an employee’s movements in the event of a positive COVID-19 result and alert others who may have made physical contact with that individual. A future proof business model Decision-makers surveyed that use of cloud technologies to increase in the future as a result of COVID-19 78% of the 1000 senior decision-makers surveyed anticipate their organisations’ use of cloud technologies to increase in the future as a result of COVID-19. Rather than being tied to fixed IT infrastructure on-premises, businesses are able to customise and scale quickly to meet ongoing challenges without the need for large upfront capital investment. The convenience of as-a-service can be paid for out of operational expenditure as a monthly cost. This is the proven business model of the cloud. Yet the security industry has been slow to adopt it. One key challenge is the way in which the prevalent business models in the sector operate. Transitioning to sales cycles based on monthly licences rather than up-front purchases won’t be easy, but the security channel must learn how if it is to remain competitive and drive new business opportunities. This recurring revenue model will be interesting for the physical security industry who will have witnessed uncertainty and, in some cases, a downturn in revenues as decisions around capital expenditure were put on hold during the crisis. Full support and extensive functionality From a customer perspective, 28% of respondents highlighted cost benefits as a key factor in the move towards VSaaS/ACaaS and 19% indicated that they would expect to see all-inclusive updates/upgrades and support. VSaaS and ACaaS are supported by the latest software updates and firmware upgrades, so are always up to date. Additionally, functionality such as remote management allows operations to be monitored offsite via mobile device. Access from any location (32%), remote maintenance (31%), and the ability to monitor empty sites (29%) were all identified as key benefits of introducing VSaaS and ACaaS, alongside better security (40%) and better functionality (33%). The revelation that such technology is employed by over half of organisations across a wide range of industries is a comforting validation of its benefits, and evidence that hosted physical security is in great demand. 30% of those surveyed indicated that they did not currently use such solutions, but were considering their implementation. Cloud’s resilience and ability to connect the world during the COVID-19 pandemic has clearly proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. VSaaS and ACaaS provide flexibility in a security and business solution that meets the demands of a rapidly evolving industry.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data centre world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
Visimetrics, digital video surveillance specialist, is a proven quantity for surveillance systems within the casino industryLeading manufacturer of Digital Evidence Recorders™ for CCTV and surveillance applications, Visimetrics, have provided their flagship FASTAR CCTV recording solution to A&S Leisure's Napoleons chain of casinos in Sheffield, Leeds, Hull and Bradford.Operational Director of A&S Leisure Group, Mark Allen, says, "Visimetrics are a proven quantity for surveillance systems within the casino industry. With clear experience and reference projects in place, they came highly recommended by our systems integrator Zepha Security and industry colleagues alike. We needed a very high quality recording system with clear video and audio output that could be used easily by our staff on site while also providing remote access to our sites from head office. We were also keen to ensure we had a fully flexible solution that can be easily extended moving forward."While I'm happy to say the solution in practice has proved excellent, the experience of working with Visimetrics in designing and delivering our surveillance system has been invaluable. We are benefiting further from this by collectively looking at ways of using the recording systems to bring more information together. A current example is the integration of till information - linking our EPOS data with the video recordings using the data recording feature within FASTAR."Visimetrics Business Development Director, Gary James, says, "We're delighted that A&S Leisure has chosen our solution for their casinos. Our recorders are used daily to gather evidence of cheat moves, theft, barred persons, self-excluders etc. We've focused heavily on casino usage in the development of our management software, CONTROL SMS. Various tools and features have been incorporated for the management, review and export of footage by surveillance, security and compliance departments."By far the core of FASTAR's daily usage is in resolving gaming disputes quickly. While the need for high quality video is obvious it's the audio content and quality that becomes essential in these circumstances and is often the deciding factor in closing disputes satisfactorily.The implementation of the FASTAR solution at all Napoleons Casinos is now completed and the EPOS project is currently under development.
Playerbook Facial Recognition System launch will take place at IFSEC 2011 Leading CCTV storage systems manufacturer, Visimetrics (UK) Ltd, will be launching their new Playerbook™ facial recognition system at IFSEC 2011. Playerbook has been developed to operate reliably in the lighting conditions normally found in casino environments. Powered by Omniperception's facial recognition engine, the new application is the result of a 2 year development process between the companies.Gary James, Business Development Director of Visimetrics says "The background to the development of Playerbook originated from many of our casino clients who indicated that a form of non-intrusive, reliable subject identification would be of significant benefit to them in dealing with the public. Casinos have a vested interest, for compliance and commercial reasons, in identifying certain types of visitors on entry to the venue. We knew from our experience of digital CCTV systems that the various forms of lighting within casinos create shadowing, reflection and glare. These effects have a significant impact on the reliability of facial recognition. We knew we needed to find another approach to solving the problem and identified the unique facial recognition process Omniperception developed as the core engine most likely to meet the consistency and reliability needed in casinos."Gary continues "At the heart of the system is a subject watchlist that allows security and surveillance staff to automatically detect self-excluders, barred/crime & disorder subjects, advise on entry subjects, VIP's and more. Playerbook operates in real time, providing reliable and consistent identification. The critical challenge was to develop a system, which reliably detects faces in the low or zero light conditions you find in casinos. We believe we have achieved this successfully. Playerbook works by locating the 500-600 unique facial identifiers of individuals as they pass the IR sensor. Using a unique illumination and polarisation filter system, Playerbook is able to consistently compare the detected facial identifiers with subjects already stored within the watchlist regardless of shadows, glare or reflection. The watchlist search is completed instantly. When there's a match between a subject entering the venue and the watchlist, Playerbook alerts staff immediately via the GUI, SMS or email. Playerbook has been successfully proven using ground-truth validation testing within one of the largest casinos in the UK. The invaluable input from the management and staff was critical to the development and refining process to achieve a reliable solution within such a difficult operating environment." "Playerbook operates in real time, providing reliable and consistent identification. The critical challenge was to develop a system, which reliably detects faces in the low or zero light conditions you find in casinos. We believe we have achieved this successfully..."Playerbook @ a glance: Light immune - uses a unique lighting solution designed to work in dark environment Fast - captures facial identifiers and compares these against a 'watchlist' in real timeAccurate - Playerbook is powered by Omniperception's facial recognition engineConvenient - Playerbook's non-intrusive IR sensor identifies subjects to a range of 5 metresEasy to use - simple workflow using browser based app to add individuals to watchlist Playerbook will be demonstrated at the Intelligent Integration Zone on Stand E140 in Hall 4.If you would like to arrange an appointment for a demonstration in advance of the show, please contact Gary James on e-mail or on tel: 01292 673 770.Playerbook captures facial identifiers and compares these against a 'watchlist' in real time.
The metadata extracted from the video as it is being recorded is used by FiND for creation of databaseLeading CCTV storage systems manufacturer, Visimetrics (UK) Ltd, will be launching the result of a £1M research and development project at IFSEC this year. FiND will significantly reduce the search time of large periods of CCTV recordings for key points of evidence. The R&D project team includes the DTI's Technology Strategy Board, Loughborough University, PERA and Visimetrics.Craig Howie, Commercial Director of Visimetrics, says, "Following the London bombings in July 2005, the Metropolitan Police Service reviewed over 100,000 hours of CCTV footage as part of their incident investigation. This process consumed a huge amount of operational man hours and significantly increased the amount of time required to progress the investigation. The issues faced by the police in this instance inspired a technical solution to significantly reduce the time, man power resources, (and costs) needed to review large amounts of CCTV recordings while searching for key points of evidence." "FiND - Forensic investigation Network Database - has been developed with the capability of linking to any CCTV recording system to create and index key objects of interest at the time of video capture and storage. The technology works by allowing operators to search via a powerful 'FiND' processing engine that immediately identifies relevant footage. By inputting key parameters, the system will search the database of classified objects and display relevant images using thumbnail identification, ready for review. The speed of response is derived from searching the object data index, rather than the traditional video based 'region of interest' search, using selected areas of a specific camera." "FiND will reduce the search period of days, weeks - or months - worth of digitally recorded video down to a matter of seconds..." FiND emerged from initial research undertaken by Loughborough University evaluating the most technically challenging aspects of using automated video analysis to search large volumes of existing CCTV recordings for key or 'known' objects of interest. Performing complex video analysis on recordings from public space cameras in particular is challenging and the development team had to overcome many limitations affecting image quality. These included camera position, height, skew and shake as well as common issues such as lighting, colour consistency and video interlacing. Resolving these issues is essential in order to perform accurate evaluation to reach a stage where you can analyse the video. Two areas in particular quickly became evident as barriers to progress: colour consistency and lighting/shadowing. The team developed algorithms to overcome these barriers and this dramatically improved the video consistency and the accuracy of results.The stored metadata is negligible in size when compared to standard resolution and frame rate videoGenerating colour and lighting consistency formed the foundation for the research and development of a comprehensive set of algorithms specifically aimed at resolving vehicle classification, people classification, license plate identification using CCTV cameras, text/logo detection, baggage detection, complex background processing and PTZ compensation. A number these algorithms are completely unique.FiND functions by the creation of a database of key objects of information extracted from the video as it is being recorded. This information is normally referred to as metadata and provides the source of results for all future searches. The stored metadata is negligible in size when compared to standard resolution and frame rate video. Thus, storing all key objects of interest from an entire system in this way becomes irrelevant in overall storage terms. The metadata is created in real time by processing the recorded video using the unique algorithms. This process captures all relevant objects within each video scene to give operators a wide range of search criteria for any future investigation.As an example of the scope of search the criteria can be set to 'person wearing red shirt'. Further refinement can be added to achieve 'person wearing red shirt, carrying a back pack at a specific time of day'. Searching in this way then occurs across the entire source of metadata from all cameras. This produces the most comprehensive set of results from entire recording systems using a single step process.In vehicle classification derived attributes take the form of number plates, logos, signage, etc.FiND classifies objects as part of its identification process. Object classification is based upon a hierarchical approach beginning with the determination of either vehicle or person(s). Once a person(s) or vehicle has been classified, further feature determination is performed, right down to very basic attributes such as shape, colour, location relative to the frame, time, characters etc. Basic features are then used to FiND derived attributes such as the presence of a suitcase, backpack etc. when classified as human objects. In vehicle classification; derived attributes take the form of number plates, logos, signage, etc. The derived attributes are stored alongside the basic attributes for use in all future searching.According to Craig Howie, "FiND will reduce the search period of days, weeks - or months - worth of digitally recorded video down to a matter of seconds. The range of search criteria, evidential algorithms and pre-indexed video gives users the means to view the matching images as they work. The speed and accuracy of results makes the running and re-running of searches practical as more off-line information relating to an incident becomes available. There is no need to select individual cameras, 'regions of interest 'or wait for short sections of video to be indexed on-demand before viewing. FiND searches the pre-indexed video across the entire recording system to quickly identify images matching the operators search criteria."FiND is available as an extension to existing recording systems. FiND has also been developed for true portability of the algorithms and metadata creation for use within embedded products such as IP cameras, video encoders or DVR/NVRs. FiND is also available with a software interface providing the means to integrate the search tool with legacy or third party applications and systems.
Related white papers
Cloud video and smart cities
Security investments retailers should consider for their 2021 budget
Market Report: Cannabis at a glance
Delivering a smart, secure and healthy workplace with cloudDownload
Are your technology providers keeping you in the dark?Download
Facing the ever-evolving hacker head-onDownload
Capture new opportunities with computer vision and video analyticsDownload
ClanTect and ePm sign agreement to offer next-gen systems for the detection of humans in vehicles in the UAE
- ClanTect and ePm sign agreement to offer next-gen systems for the detection of humans in vehicles in the UAE
- OPTEX selected by Harper Security Systems to protect private residences and property in rural environments
- Matrix secured Nashik railway station during Kumbh Mela
- BIRD Aerosystems won a contract to deliver the SPREOS DIRCM to a customer's VIP and Military fleet