Vicon Video Surveillance Cameras(1)
True Day / Night, 1080p TVL resolution, HD, Digital (DSP), Auto Iris, 0 ~ 0.4 lux, 12 V DC, 2.8 ~ 12, Wide Dynamic Range, 1920 x 1080, > 50, AHD, TVI, CVI, CVBS (960H), 70 mA (IR OFF), 390 mA (IR ON), 240 x 105 x 115, 1200, -30 ~ +70 C (-22 ~ +158 F), IP66, < 90Add to Compare
Browse Video Surveillance Cameras
- Auto Iris
Surveillance camera products updated recently
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components, announced the availability of Valerus version 20, which adds features designed to expand its overall capabilities while maintaining its core value as the easiest VMS on the market. This latest release offers features that include: interactive mapping, an event query engine and bookmarking functionality. Improving event response time Valerus’ new interactive mapping feature provides the ability to create detailed maps from PNG or JPEG image files. Users can then overlay resource icons on to these maps, with the flexibility to control the location and view of the resource; for added ease of functionality, maps can be linked to other maps. The mapping functionality presents a wealth of information in a very efficient and understandable manner and is extremely useful for local law enforcement and security teams. The addition of a dedicated events database provides the ability to store all events that occur in Valerus, including both internal and external events, allowing the user to look back historically. This offers a new search capability, where users can create queries based on parameters such as motion detection, digital input, external events and analytics services. The event search feature enhances the way users interact with systems, dramatically improving event response times and helping make event issues more actionable. Complex password for increased security The numeric ID can be edited on its resource properties page as well the dedicated numeric ID page Another new feature available in version 20 is bookmarking, which adds the ability for the user to create a bookmark related to a specific video feed and allows entering notes so users can easily share information. The bookmark is accessible on the playback video and will be stored in the events database, so it can be queried. Bookmarking helps keep track of noteworthy events while users are building a case or trying to gain a better understanding of concerning incidents. In keeping with the Valerus commitment to delivering “advanced simplicity,” Valerus 20 has enhanced many user functions for ease-of-use. There is now the ability to enforce a complex password for increased security. The numeric ID of a device can now be edited directly on its resource properties page as well the dedicated numeric ID page. The Excel report shows added information, including the MAC address, numeric ID and Gateway server, to better serve the user. VMS replacement projects There is a dynamic link from an error on the dashboard directly to that resource’s configuration page. An advanced log report was added to aid in troubleshooting any problems that might arise. To encourage users to take advantage of this new release introduction, Vicon has launched two promotional campaigns. The offers are targeted at new VMS installs and VMS replacement projects, offering free licenses for Valerus 20; so now is the time to experience the advanced simplicity of Valerus. “Vicon’s Valerus VMS platform has proven to be widely embraced in enterprise applications, and we anticipate that the features we are introducing with Valerus version 20 will do much to further that trend,” said Bret McGowan, Senior V.P. of Sales and Marketing.
Vicon Industries Inc. (VCON: OTCQB Venture Market) ("Vicon"), designer and manufacturer of video surveillance and access control software, hardware and components, announced today that Louisa County Public Schools, in Northern Virginia, has completed installation of a district-wide Vicon Valerus video management solution that encompasses its six school buildings and connects nearly 400 cameras. The system includes multiple application servers and NVRs running Valerus VMS software, as well as a wide range of Vicon IP megapixel camera models. The district has opted to share camera access with the Louisa County Sheriff’s Department, whose officers can use iPads and smartphones to immediately call up video through the Valerus VMS interface in case of an emergency. This allows them to visually assess any situation and locate the perpetrator before sending in officers. Vicon Sponsored Training Class The Valerus solution was chosen by Louisa County Public Schools because of Vicon’s willingness to provide the district’s in-house electricians and technical team with as much autonomy as possible in setting up and managing the system. After participating in a Vicon sponsored training class, the district has been self-sufficient in its ability to install, program and troubleshoot Valerus. David Szalankiewicz, LCPS Facilities Director, says "Vicon’s technical team has supported our in-house guys directly with training and certification so that we feel completely in control." Ron Lapsley, Vicon’s Regional Sales Manager who worked on the project, explains, "Vicon understands that the technical capabilities and service needs are different for each customer, and we’re glad to provide the right level of support that makes sense. In many cases, the manufacturer relationship is as important as the product itself in making sure a customer is satisfied."
With increased security a priority for school districts across the country, administrators are taking a close look at their technology to ensure it can deliver in an emergency. Concerns over active shooters and other violent scenarios have districts paying attention and putting heightened security measures in place. Christopher Lordi, Director of Administrative Services at Delaware Valley School District in rural, northeast Pennsylvania, knew it was time to upgrade his district’s surveillance technology, so he turned to the integration expertise of Guyette Communications to get the job done. Analog DVR System The outdoor PTZ cameras that panned back and forth were causing them to miss a lot of activity The DVR system that covered Delaware Valley’s seven schools and nine buildings was state-of-the-art when it was installed a decade ago, but it was no longer meeting the district’s needs. Administrators complained that is was difficult to view and manage video from all of the cameras as a unified system. The analog video made it hard to identify faces and see other important details. And the outdoor PTZ cameras that panned back and forth were causing them to miss a lot of activity. “We had a lot of blind spots,” says Chris. Guyette Communications, of Plymouth, PA, has worked with the district for over a decade supporting its technology needs, so Chris looked to them for guidance. Scott Surochak and Rick Scalzo, both of Guyette, recommended a new-to-market VMS, Vicon’s Valerus, that they felt would provide all the features and performance the district sought in a very cost-effective manner. They also recommended that the district abandon their analog cameras and standardize district-wide on higher performance, megapixel IP models. Valerus VMS The significant expense of replacing not just the VMS system, but hundreds of cameras district-wide, required buy-in from the school board. Rick and Scott, along with Vicon’s regional sales manager, Doug Stadler, provided an in-depth demonstration of the capabilities of Vicon’s new Valerus VMS, along with its line of IQeye Alliance cameras, to the school board. The new system would allow them to clearly identify the faces of visitors, read license plates within the school parking lots, eliminate current blind spots throughout the campuses, and easily search video to quickly find evidence of crime or vandalism. Convinced of the long-term value of the investment, the school board gave a green light to proceed. Vicon Fixed And Cruiser Cameras Approximately 400 cameras were installed throughout the district’s nine buildings, almost all of which are Vicon 3MP IQeye Alliance fixed domes Installation began in March 2017 and continued throughout the summer. Approximately 400 cameras were installed throughout the district’s nine buildings, almost all of which are Vicon 3MP IQeye Alliance fixed domes. These provide coverage of all entrances to buildings, busy hallways, and spaces like lunchrooms, auditoriums, playgrounds, parking lots and athletic fields. In addition, Vicon Cruiser domes with 30X optical zoom were installed in each parking lot to capture license plates. To support so many high-resolution cameras transmitting at full frame rates, Guyette installed a dedicated security network capable of handling the bandwidth. All cameras are hard wired with new CAT-6 cabling, which feeds back to CISCO switches and a fiber backbone that runs through each building. Installing Security Network To minimize bandwidth transmission between buildings, Guyette recommended that each school locally record video from its respective cameras. The five lower schools have each been equipped with a single Valerus server that both runs VMS application software and performs as an NVR. The middle school and high school, which share a building, have an application server plus four NVRs to support the higher number of cameras. Because the Valerus VMS software makes exclusive use of a thin-client, there was no need to install software on any workstations. Complete user and administrative functionality is available through a standard web browser interface. Rick says that “Installation went very smoothly. The system works well and it’s easy to navigate and program. I’m used to systems where we have to do everything manually, but with Valerus, it does a lot of things for you. For example, you can copy programming to multiple cameras. Setting up one camera and then copying it to 50 others is a huge time saver.” “The system is also really easy to update,” he says. “Two new Valerus versions were released during the months we were doing the installation, and we just had to download it once each time to an application server, and then it was automatically pushed out to all the other servers on the network.” Efficient Crime DetectionTwo new Valerus versions were released during the months we were doing the installation, and we just had to download it once each time to an application server" There isn’t a lot of criminal activity in the Delaware Valley School District, thanks to outreach programs that create a collaborative relationship between the school police force, administrators, students and parents. However, sometimes issues do occur, and Valerus has already helped the district solve a theft. Chris describes an incident that occurred while the system was still being installed in the spring of 2017. “There was a theft from one of the administrative offices. The employee thought the office had been locked, but our surveillance video was able to show that it was not and displayed the comings and goings of everyone who entered the office during the time in question. The video quality was so clear that the thief’s face could be identified. The footage was turned over to the local police who were able to apprehend the thief and recover the stolen property. With our old VMS system, the video wouldn’t have provided enough detail for us to identify the culprit.” High-End Video Surveillance Chris says he’d love to say that Valerus’ “museum search” made it possible to find the incriminating video in minutes. However, because the system was just getting installed, not all features were operational yet and his police force had to manually look through hours of video. “The officers are really looking forward to being able to use the search function in the future, now that we’re all up and running. They love how you can draw a box over an area of the video where you know something has happened, and Valerus will do all the work for you,” he says. In speaking about response to crimes and emergencies, Rick adds that because Valerus uses a thin client, the school district has the luxury of easily providing outside law enforcement with access to their system. If they ever needed help from local or state police, like in an active shooter situation, administrators can provide them with a link to the district’s network so that they can better coordinate a response. This would have been impossible with their old system. Ensuring Valerus System’s Functionality The VMS thin-client interface allows the officers to view video from anywhere, including on their phones or tablets Unusual for a district of its size, Delaware Valley has its own, full-time, six-person police force. Among other responsibilities, this force is tasked with monitoring the new Valerus system. Each officer has been equipped with his or her own workstation from which they can monitor the cameras physically located at their assigned schools. Administrators at each building also have access to view local cameras. In addition, a centrally located, district-wide monitoring station has been set up to make it easy for officers and school officials to keep an eye on the district as a whole. Rick Scalzo explains that while the VMS thin-client interface allows the officers to view video from anywhere, including on their phones or tablets, his team recommended the purchase of high-performance, manufacturer-certified PC workstations for each officer’s monitoring station. This was to ensure that these computers would have the necessary processing power to display large numbers of high-resolution camera feeds simultaneously. These workstations are hard wired to the network to provide the fastest and most reliable connectivity to the application server. Chris Lordi says that the district has also provided all officers with iPhone 6s, which they use regularly to monitor what’s happening at their buildings. License Plate Recognition And PTZ Cameras One of the capabilities that the district required of the new system is the ability to read license plates of vehicles entering or exiting school grounds. Officers are able to take control of the PTZ cameras in each parking lot and zoom in on the plates of any vehicles of interest. This can even be done via the iPhone interface. Chris explains that it has not been necessary to integrate Valerus with any special license plate recognition (LPR) software because his team of police officers has immediate access to databases where they can look up plates as needed. However, this integration is currently available for Valerus customers and can help automate the process for those who need it. Intruder Detection They want top-notch safety, and Valerus delivers that" Chris says that “Our school board takes safety and security very seriously, so for them, this significant investment was justified as soon as we showed them what it can do. They want top-notch safety, and Valerus delivers that. Buy-in from teachers, and the union, who have expressed reservations over the placement of many new cameras that didn’t previously exist, has required additional communication and education. Both Chris and Rick have made it very clear that the upgraded system is not for the purpose of intimidating or keeping closer watch on employees as they perform their daily jobs. Our main concern is thwarting security threats and keeping everybody safe. The additional cameras and new software might help us break up a fight or address bullying issues, but it’s also important for much more serious situations, like dealing with an active shooter or act of terrorism. Now we can use cameras to follow an intruder throughout our buildings, and that can help us keep everyone safe while we apprehend him.” Chris says that “When we put it like that, everyone gets on board.” Counter Terror Chris is extremely appreciative of the support Guyette Communications has provided throughout this project, including individually training each school principal as their building was completed. “I can’t stress how well Guyette has delivered for us. They’re flexible, reliable and compassionate, and they’ve been a true partner at every step of the way. I’d recommend Guyette to anybody.” With school back in session, and the district’s police force busy implementing its many safety programs, Chris looks forward to another school year without any major security incidents. However, with a new Valerus system and high-resolution cameras in place, he knows he now has not only the right people but the right technology to handle any crisis.
The Security Behind Financial SecurityDownload
Nine Ways To Make Your Retail Security System Work HarderDownload
Financial Institutions Require Future-Ready Physical Security TechnologiesDownload
Maxxess EFusion Technology To Be Integrated Along With The Critical Building Management And Security Systems At Wasl Tower In Dubai
PACOM Secures Financial Centers And ATMs Of Hancock Whitney Corporation With Its GMS Software Platform
- Maxxess EFusion Technology To Be Integrated Along With The Critical Building Management And Security Systems At Wasl Tower In Dubai
- PACOM Secures Financial Centers And ATMs Of Hancock Whitney Corporation With Its GMS Software Platform
- Dahua Provides Its Mobile Solution To Enhance Patrolling Services For The Buenos Aires Police
- Gallagher Security Aids King's Cross Estate Services In Securing The Redeveloping King’s Cross, London