MOXA Video Surveillance Cameras(1)
1/3 inch, Colour / Monochrome, 540 TVL resolution, Pan Tilt, 0.02 lux, PoE, Motion Activated, 3 ~ 16, Surface, flush, Back Light Compensation, Auto Gain Control, White Balance, 1/50 ~ 1/120,000 sec., 50, Internal, PAL, NTSC, Compact, via Ethernet, 6.5 W, 125 x 125 x 109, -25 ~ +55, IP66, 5 ~ 95Add to Compare
Browse Video Surveillance Cameras
- Auto Iris
Surveillance camera products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Moxa Inc., a pioneer in industrial communications and networking, releases a major upgrade for its MXview industrial network management software. Enhanced compatibility now lets customers seamlessly integrate MXview into both IT and OT systems. In addition, it is possible to centrally manage large-scale networks featuring up to 10 sites using real-time, operational data to configure, monitor and diagnose a maximum of 20,000 devices. Key to the success of the new upgrade is a faster, more user-friendly interface that provides full visibility and holistic transparency into network status. Network management tool MXview will generate comprehensive reports, including inventory, traffic and availability, that empower customers to transform complex system metrics into IIoT performance indicators. MXview is a scalable network management tool developed to deal with the expanding industrial network requirements" “MXview is a scalable network management tool developed to deal with the expanding industrial network requirements of the IIoT,” said Theo Lai, Product Manager at Moxa. “We developed the latest version of MXview with two goals in mind: to make network management easier and to ensure that the software is simple-to-use for the best user experience.” Manage industrial networks In order to further simplify network management, MXview allows users to get the data they need from a main control dashboard where IT professionals can quickly analyze and respond to network changes so the issues can be resolved before escalating and impacting the business. Integration is simple: a web widget generates a URL enabling the integration of MXview into SCADA systems and other web-based applications where the control dashboard can be viewed from both local and remote sites at anytime. In addition to integrating MXview into OT applications, the software now supports RESTful API, which provides IT engineers with more options to manage industrial networks using their own dashboard to minimize maintenance effort. The net result of these upgrades is more effective use of network assets, which can lead to lower costs and reduced risk.
As manufacturers look to embrace the Industrial Internet of Things (IIoT), Moxa Inc., a leader in industrial communications and networking, is helping companies more easily connect their serial devices to cloud systems for IIoT applications by offering Moxa NPort IA(W)5000A-I/O Series wired or wireless serial device servers and MGate 5105-MB-EIP Series protocol gateways with ready-to-run cloud connectivity capabilities. Integrated Connectivity Solutions Moxa's integrated connectivity solutions can collect multiple different field data structures, including serial, I/O, Modbus, and EtherNet/IP Moxa's integrated connectivity solutions can collect multiple different field data structures, including serial, I/O, Modbus, and EtherNet/IP, transforming IIoT manufacturing operations by uncovering previously unobtainable insights. Powered by the MQTT messaging protocol, data is then transmitted securely to Microsoft Azure or other publicly and privately hosted cloud services, so that companies can analyze it to spur innovation and accelerate their IIoT strategies. To realize the full value of the new features across the enterprise, Moxa employed intuitive user interfaces and functions so that engineers can easily tap into the cloud for their IIoT deployments. Initial setup to full implementation can be completed within a few steps for immediate realization of efficiencies and cost savings. In addition, advanced diagnostics tools are supported to assist users in identifying connection issues so that a variety of field devices can easily share data in the cloud while protecting data integrity and network security. Moxa Cloud Solution By working with the Moxa cloud solution, companies will also avoid packet loss resulting from unstable connections. A loss buffer queues incoming data from field devices when connections are unstable and transmits it only when the connection is stabilized. Moxa NPort IA5000A-I/O and NPort IAW5000A-I/O serial device servers feature built-in digital I/Os Moxa NPort IA5000A-I/O and NPort IAW5000A-I/O serial device servers feature built-in digital I/Os and provide maximum flexibility when needed to integrate serial equipment in the field with an Ethernet network or cloud platform. A combination of digital I/Os make the device servers well-suited for a variety of industrial data acquisition applications. Both servers collect serial or I/O data for the cloud application. Moxa MGate 5105-MB-EIP The MGate 5105-MB-EIP is an industrial Ethernet gateway for Modbus RTU/ASCII/TCP and EtherNet/IP network communications with IIoT applications. To integrate existing Modbus devices onto an EtherNet/IP network, use the MGate 5105-MB-EIP as a Modbus master or slave to collect data and exchange data with EtherNet/IP devices. The MGate 5105-MB-EIP Series collects EtherNet/IP and Modbus RTU/TCP data for the cloud solution.
Moxa Inc., a provider of industrial communications and networking, and Trend Micro Incorporated, a provider cybersecurity solutions, announce they have executed a letter of intent relating to the formation of a joint-venture corporation-TXOne Networks, which will focus on the security needs present in the Industrial Internet of Things (IIoT) environments, including smart manufacturing, smart city, smart energy and more. Historically, Information Technology (IT) and Operations Technology (OT) have operated within industrial organizations as isolated and independent networks with different teams, objectives and requirements. Securing The Entire Ecosystem TXOne Networks combines these strengths and responds to the growing security needs of industry Organizations are teeming with machinery and devices that were not originally designed for connectivity to the corporate network, which means they often lack the ability to be easily updated or patched for security measures. There is a critical need to secure these devices, identify clear ongoing ownership, and to provide a holistic view across the broadening attack surface within enterprises. Trend Micro, majority owner in TXOne Networks, identified the potential challenges faced by IIoT stakeholders early on and has been working on several fronts to secure the entire ecosystem, from data center to device. Moxa Inc. brings more than 30 years of experience in industrial networking and protocol expertise. TXOne Networks combines these strengths and responds to the growing security needs of industry, such as smart factories that require a unified solution for delivering deeper visibility into both devices and protocols. Partnering With Moxa These complicated environments are made up of multiple layers requiring protection that sits in and between IT and OT. The responsibility for the security of these combined layers is traditionally unclear. "I'm excited about this venture and how Trend Micro continues to take diverse yet focused growth steps that allow our teams to remain concentrated on core strengths while giving room to better serve customers and advance into new markets," said Eva Chen, Chief Executive Officer for Trend Micro. "Partnering with Moxa will combine more than 60 years of expertise to accelerate our ability to view and secure the extended enterprise including these important but often overlooked OT environments." Reinforced Business Model Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength TXOne Networks will build security gateways, endpoint agents and network segmentation to secure, control, and provide visibility of operational technology and equipment. Unlike some solutions focused solely on protecting assets nearest to the IT layer via detection, TXOne Networks has expertise closest to the OT layer and will provide proactive, timely and easily implemented solutions to secure the Industrial Control Systems (ICS) world. In addition to investing intellectual capital, funds and dedicated headcount, each parent company lends complementary channel expertise. For its part, Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength. Together these reinforce the business model and geographic territory targets. Reducing Operational Risk TXOne Networks will be led by Dr. Terence Liu, Trend Micro Vice President and former CEO of Broadweb. With experience building both products and teams, Dr. Liu will bring nearly 20 years of security product expertise to this new team. "With this joint venture, Moxa and Trend Micro will position TXOne Networks as a global leader in the industry to create effective IIoT security solutions that help ensure that IIoT applications and critical infrastructures are secure," said Andy Cheng, Strategic Business Unit President for Moxa Inc. "Industrial automation customers around the globe will be able to reap the benefits of having a holistic OT/IT security solution to protect assets and reduce operational risk." Raising Security Levels TXOne solutions also will enable OT customers to optimize network infrastructure for more IIoT opportunities TXOne solutions also will enable OT customers to optimize network infrastructure for more IIoT opportunities. They will benefit from Moxa's expertise in building reliable networks to bring more legacy and disparate networks into on industry-grade Ethernet backbone and raising the security level of the entire network's communication to help drive nonstop productivity and cost reduction. Professional services will also be provided including security risk assessment, security breach response, and access to threat intelligence from Trend Micro Research and its Zero Day Initiative (ZDI). "In a world where attacks are getting more persistent and sophisticated, while organizations are struggling with skills shortage and alert fatigue, these two groups are joining forces to successfully secure enterprises around the globe," said Dr. Terence Liu, General Manager, TXOne Networks. "I am eager to pursue the opportunities and challenges this team will tackle in the months and years to come."
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
Mobile Access- What You Need To Know (Part 1)Download
Security Device Manufacturers Develop Interfaces To Be Compatible With Gunshot Detection Technologies
- 360 Vision Technology’s Invictus Hybrid PTZ Cameras Deployed At Security Centers International’s Mobile Advanced Safety Tower (MAST)
- Comelit 4 Camera Wireless CCTV System Secures One Of UK’s Famous Tourist Landmark, Chichester Cathedral
- FLIR Highlights Importance Of Thermal Imaging Cameras And Its Security Applications
- Dahua Technology’s Intelligent Video Surveillance Cameras Offer AI-Enabled Video Security For Allianz Parque