Dahua 6MP multi-sensor panoramic IR bullet camera
Dahua 6MP multi-sensor panoramic IR bullet camera

Dahua Technology, a high-value, total security solutions provider, will display a new 6MP Panoramic Multi-sensor IR Bullet camera to capture wide areas that typically would require multiple cameras at the ASIS International Conference, where visitors are invited to “Discover the Dahua Difference” at booth #2241. With three individual 2MP cameras residing in an all-in-one IP67 weather-resistant indoor/outdoor housing, the Dahua 6MP HD Multi-Lens Panoramic Network IR Bullet Camera minimises maintenance, cabling and support costs, and can be installed in two-thirds less time. High Quality Images Embedded with an IR cut filter for varying lighting conditions and industry-leading wide dynamic range (WDR) technology (120dB), the camera provides excellent images at any time of day. For challenging low-light applications, the Multi-Sensor IR Bullet camera offers Starlight technology, capturing colour details in low light down to 0.005 lux, resulting in stunningly clear images in very dark environments. Each sensor features a 3.6mm fixed manual lens and an integrated infrared illuminator up to 30m (100ft) for identification of events or intruders. “This multi-sensor IR bullet camera combines three 2MP sensors to create a comprehensive 180-degree overview. It offers one of the most valuable benefits known to man, which is time,” said Tim Wang, CEO, Dahua Technology USA. “Offering the ability to replace multiple single-sensor cameras, this new product offering can save as much as two-thirds the installation time, offering a higher return on investment.” Features With optional built-in intelligent video analytics, the Multi-sensor IR Bullet camera has the ability to detect and analyse moving objects for improved video surveillance. It provides intelligence at the edge, allowing detection of multiple object behaviours such as abandoned or missing objects, facial detection, people counting, and heat mapping. Other key features and benefits include: High Efficiency Video Coding - delivers high quality video without straining the network. Region of Interest (ROI) - allows the user to select and assign specific areas of the scene for bandwidth optimisation. Privacy Masking - four on each sensor, ensures dedicated areas are blocked from viewing. Street Lamp White Balance - compensates for yellow-tinted lighting and restores scenes to their original colour. Integration - conforms to the ONVIF Profile S & G specifications to ensure interoperability between network video products. Onboard Storage - features a Micro SD card slot (Max 128GB), which can eliminate the need and cost for an on-site server, NVR, or PC for recording video.

Add to Compare

Surveillance cameras - Expert commentary

Physical And Cyber Security Precautions When Travelling
Physical And Cyber Security Precautions When Travelling

Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those traveling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveler take to protect their calls, texts and data streams from being spied on? Duvall: When traveling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen  Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travelers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilized by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilize Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travelers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travelers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travelers’ hotel rooms. When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveler take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travelers? Companies should educate their employees on the importance of maintaining good internet hygiene while traveling abroad Duvall: When traveling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while traveling abroad. Some general tips to recommend to your employees when traveling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if traveling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveler benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related Apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customizable healthy travel packing list. The app can store travel documents, keep records of medications and immunizations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travelers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travelers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travelers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.

Mass Transit Security Evolves With Modern Security Solutions
Mass Transit Security Evolves With Modern Security Solutions

As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving Mass Transit Security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime Prevention In Transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train Security And Safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing The Right Technology For The Solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit Security With Modern Technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.

Robust Security For The Cannabis Market Supply Chain
Robust Security For The Cannabis Market Supply Chain

It's no secret that one of the next market segments to see exceptional growth nationwide is somewhat non-traditional: cannabis. The global cannabis market is projected to reach $60 billion by 2024, according to Ameri Research, fueled by the increasing legalisation and decriminalisation across much of the United States. It is estimated that 22 million pounds of marijuana are grown each year in the United States, with 80 percent coming from California, Tennessee, Kentucky, Hawaii and Washington, according to Mother Jones. Unlike other products, this commodity is valuable from the moment the seeds go in the ground to the exchanging of money for end-user products - and at every point in between.Within large greenhouses, 360-degree cameras that show a wide field of view are essential for cannabis protection From seedlings to selling, securing every point within the supply chain is vital to the assets being distributed, and companies are now realising how lucrative this endeavor can be. Critical to the success of the industry is keeping the merchandise secure and the workers safe. In this article, we explore each part of the supply chain within the cannabis market and address ways of implementing robust security measures.  Plants, Fields And Greenhouses This is one industry where money actually grows on trees! When cannabis crops are planted either in greenhouses or in fields, security becomes critical, since the plants themselves are worth a significant amount of money. A single truckload can be worth hundreds of thousands of dollars, so securing the load is crucial to the process Producers don't want plants stolen – especially high-end varieties that garner a bigger profit when harvested and sold – and the size of the plants make theft a greater possibility. Video surveillance becomes vital at this point and can be used in a variety of ways. Within large greenhouses, single cameras that can cover a wide expanse of space, such as cameras that offer 360-degree views, are essential and can provide more coverage with less investment overall than traditional narrow field-of-view cameras.Advanced technology, such as unmanned aerial vehicles (or drones), are also being used in open fields in an effort to protect these plants.  Comprehensive video surveillance becomes the main tool for thwarting cannabis theft and addressing incidents as they arise Transportation And Protection Once the plants are mature enough to be harvested, they must be transported to a production facility where they are either dried or cured based on the needs of the grower, as well as processed and transformed into edible products to be sold at retail locations. There are already a range of companies that specialize in keeping these crop yields safe while they are transported: think Brinks armored transportation used for cash, but for cannabis. A single truckload can be worth hundreds of thousands of dollars – if not more – so securing the load is crucial to the process. Losing one of these loads can lead to large-scale losses for a producer. Surveillance equipment that can withstand sanitation standards and power-washing is paramount for effective protection After being transported, cannabis must be processed. In these environments, where strict handling processes are in place, surveillance equipment that can withstand sanitation standards and power-washing is paramount. This requires camera enclosures that are rated for resistance to high-pressure water jets, dust and vandalism/tampering. Since edible processing requires stringent regulations be followed, it becomes more critical for security managers to identify solutions that carry the NSF Mark, making them compliant with standards set forth for commercial food equipment in North America, or the HCV EU, the equivalent in Europe.  Many of these locations handle and store large amounts of cash since customers have to pay with cash Retail Protection As the final products come out of processing and go into storefronts to be sold by retailers in States that have recreational or medical facilities, there's another level of security that must be in place to protect these transactions. But careful considerations must be made. Traditional security tags cannot generally be used because of the small size of many of the end products, making it more difficult to track with tracking devices. Traditional security tags cannot generally be used because of the small size of many of the end products In this instance, comprehensive video surveillance becomes the main tool for thwarting theft and addressing incidents as they arise. In these locations, a loss prevention or security officer has to be an integral part of the team. Another consideration is the careful screening of the potential employees.  Since the federal government doesn't recognize cannabis producers and retailers, banks that are federally insured through the FDIC don't accept money from these establishments, meaning that many of these locations handle and store large amounts of cash since customers have to pay with cash. There must be security measures in place for these kinds of transactions, including the ability for video surveillance to be played back instantaneously in the event of an incident at a cash register. The cannabis market comes with a variety of challenges at each and every step of the operation, from growing to transport to production and sales. Video surveillance and business intelligence solutions are ideal for these applications, and as the market grows, more and more security companies will look to cater to the market.