Surveillance cameras - Expert commentary

Can CCTV Become A More Effective Tool?
Can CCTV Become A More Effective Tool?

We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line.  How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location.  Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.

The Digital Transformation Of Modern Access Control Solutions
The Digital Transformation Of Modern Access Control Solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Optimizing Large-Scale Event Security and Operations with Intelligent Video Surveillance
Optimizing Large-Scale Event Security and Operations with Intelligent Video Surveillance

Large event venues spend significant resources on physical security, and the vast majority invest in video surveillance systems as a way of monitoring public areas such as parking lots, garages and seating, as well as “backstage” areas such as loading docks and offices. Even though the camera footage is often preserved for investigating incidents, for the most part, video footage goes untapped because – realistically – security staff cannot constantly and efficiently monitor cameras in real-time or review the high volumes of archived video. Video Analytics Powered by Artificial Intelligence Increasingly, event venues are overcoming this challenge and maximizing this video data by investing in intelligent video surveillance. In this article, I’d like to explore how the combination of traditional surveillance and groundbreaking video content analytics enables event venues to not only optimize physical security and safety, but also improve customer service, streamline operations, and gather valuable business intelligence. Deep learning and artificial intelligence-based video content analytic systems detect, identify, extract, and catalog all the objects that appear in video footage, based on classes and attributes such as gender, appearance similarity, color or size. This – along with behavioral detection, such as object interactions, dwell times, and navigation paths, as well as face and license plate recognition – enables searchable, actionable and quantifiable analysis of video. The technology makes it easy for users to accelerate post-event investigations, improve situational awareness, and derive critical business insights from video data. Accelerate post-event investigations, improve situational awareness, and derive critical business insights Accelerating Investigations and Real Time Response Where there are crowds, it’s not uncommon for medical or criminal incidents to transpire. In the aftermath, security teams must quickly understand the scene and, by making video searchable, video analytics helps them efficiently gather information or evidence from multiple camera. Whereas a manual search of video footage would require hours, if not days, of valuable time and staff resources – while being subject to human error – a video content analytics system enables effective multi-video search using a variety of filters, so that post-incident investigations can be focused and, thereby, accelerated. For instance, if witnesses claim that a man in a yellow shirt caused a disturbance and then drove away in a blue pickup truck, security could filter video to review instances where people or vehicles matching those descriptions appeared, and then focus their investigation on relevant video evidence. For the same example, if the perpetrator was still at large in the venue, security managers would want to track the person’s movements and, ultimately, apprehend him. Using the same cataloged metadata that drives video search, intelligent video surveillance accelerates real-time response to developing situations from threats and suspicious behaviors to emergencies, or even any behavior that requires closer monitoring or intervention. Something as mundane as an unwieldy queue forming at a concession stand, can translate into alerting logic that increases operators’ situational awareness and ability to effectively intervene when time is of the essence. By understanding developing situations in real-time, they can respond more quickly to prevent or solve a problem. Rule-based real time alerts Users can configure rule-based real-time alerts, based on specific scenarios – such as when people counts in the defined space next to the cashier are higher than the specified threshold, indicating a queue, or when vehicles are detected dwelling in a no-park zone or sensitive security area. In the case of the offender in the yellow shirt, security could configure alerts to notify for appearances of men in yellow shirts or blue pickup trucks within the event complex. If they’re able to extract the perpetrator’s face or license plate from the video search, security officers can also identify and track the specific person and vehicle of interest. Intelligent video surveillance users can compile “watchlists” Object recognition is helpful for tracking specific, identified threats, but it can also be leveraged for locating missing persons or vehicles or offering VIP services to guests who comply. Intelligent video surveillance users can compile “watchlists” – that include persons of interest, such as past agitators, recognized criminals or terrorists, missing persons or VIPs – to be alerted when matches for these faces appear in video. Face recognition can also be used to differentiate recognized employees from visitors that are not authorized to be in certain spaces, to prevent security breaches. Because camera conditions aren’t always optimal for “in the wild” face and license plate recognition – where lighting conditions or camera angles don’t always allow for a pristine face or plate capture – it is critical to have a comprehensive video content analysis tool for triggering alerts based object classifications and non-personally-identifiable parameters is critical. Optimizing Operations Based on Business Intelligence While having real-time situational awareness is crucial for proactive intervention to developing situations, understanding long-term activity and trends can be equally important for an events venue or stadium. With video analytics, video surveillance data can be aggregated over time to generate statistical intelligence, trend reports, and data visualizations for operational intelligence. This capability transforms video surveillance from a siloed security tool to an intelligence platform with broad value for business groups across the organization: Marketing departments can gain visitor demographic information for targeted advertising and product placements. On-site retailers can uncover how visitors navigate their stores and the products or spaces that draw the most attention. Property management can follow heatmaps demonstrating where visitors dwell and the durations they stay at certain exhibits or areas, to base rental and leasing fees on actionable and quantifiable intelligence. Operations managers can more effectively plan and hire staff for events, by analyzing visitor traffic trends, entry and exit points and occupancy statistics.   Video surveillance data can be aggregated over time to generate statistical intelligence For these reasons and more, event organizations that already rely on CCTV networks, should consider how to better leverage those existing investments to deliver substantial value across the organization: By making video searchable, actionable and quantifiable, intelligent video surveillance empowers event managers to enhance public safety and physical security, while also streamlining operations and improving customer service.

Latest Hanwha Techwin America news

Hanwha Techwin America Announces 4K AI Cameras With Deep Learning Analytics
Hanwha Techwin America Announces 4K AI Cameras With Deep Learning Analytics

Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced a line of 4K AI cameras. Part of the Wisenet P series, the new AI-based cameras capture pristine images at up to 4K resolution while including powerful, in-camera deep learning algorithms for advanced object detection, classification and error-free analytics. Utilizing object recognition versus motion detection all but eliminates false alarms while also providing valuable business and operations insight. AI cameras analytics “Our new AI cameras have solid performance in both analytics and deep learning applications,” said Ray Cooke, Vice President - Products, Solutions, and Integration, Hanwha Techwin America. “The included, license-free analytics detect and classify a range of objects including people, vehicles, license plates, and faces. This technology will provide more reliable edge based intelligence, and open new opportunities in security as well as business and operations intelligence.” Unique attributes of the objects are also stored as metadata alongside the video information including: Colors of people’s clothes for both top and bottom People’s clothing length for both top and bottom People wearing of glasses or not People wearing or carrying a bag Age group Gender Vehicle types Vehicle colors Hanwha’s plugin for Video Management Software This metadata can be read by a VMS server and used in post-event forensic search to significantly reduce time spent investigating specific events. Wisenet P series AI cameras offer integration with Wisenet WAVE and other popular VMSs from Milestone and Genetec using Hanwha’s plugin. As businesses re-open with new policies regarding social distancing and occupancy limits, it’s never been more important to accurately count customers and employees as they enter and exit the premises. Unlike traditional, imprecise methods of people counting with dedicated overhead cameras, the Wisenet P series AI cameras deliver the accuracy with people counting based on the camera’s AI object detection algorithm. Reducing Server bandwidth for analytics Wisenet P series AI cameras are equipped with a ‘BestShot’ feature which ensures that only the most suitable image of classified objects is sent to a backend server. The full video image can be up to 4K resolution to see details of objects, along with tagged attributes metadata. Users have the option to set the image resolution to less than 4K for full video streaming or use BestShot to minimize bandwidth and storage requirements for server-based analytics. Additional key features include: Digital auto-tracking: provides two simultaneous streams of video, enabling operators to see the camera’s full field of view, while simultaneously viewing a Full HD digital PTZ auto-tracked image of a person or vehicle Upgraded Business Intelligence: integration with Wisenet Retail Insight providing gender and age group counting 12V DC power supply (50mA max): provides power for external sensors including LEDs, PIR sensors, and glass break detectors, eliminating the need for an additional power supply AI Dome cameras series The new Wisenet P series AI cameras are available in the following configurations: PND-A9081RV – 4K AI dome camera with built-in IR illumination PND-A9081RF – 4K AI flush-mount AI dome camera with built-in IR illumination PNV-A9081R – 4K AI vandal-resistant dome camera with built-in IR illumination PNO-A9081R – 4K AI bullet camera with built-in IR illumination PNB-A9001 – 4K AI box camera

Open Security and Safety Alliance Announce Commercial Video Security Cameras And Application Interface Specification
Open Security and Safety Alliance Announce Commercial Video Security Cameras And Application Interface Specification

The Open Security & Safety Alliance (OSSA), an industry body comprised of influencers and innovative organizations from all facets of the security, safety and building automation space, announced a series of milestones achieved in the past 20 months since the Alliance opened its doors. Significant markers include the OSSA common Technology Stack and two resulting specifications, the introduction of the first OSSA-inspired digital marketplace, and the newly unveiled “Driven by OSSA” designation for the first commercially available video security devices based on the Alliance philosophy and purpose. These accomplishments roll up into the organization’s overall vision of ‘one global approach to fuel the creation of new value within the security and safety space.’ Consistency across video security devices The OSSA-orchestrated ecosystem is designed to enhance trust, and to enable innovation and opportunity for industry stakeholders and customers. The initiative is anchored by OSSA’s first Technology Stack, which describes the fundamental thoughts on how to create harmony across video security devices to enhance trust and enable innovation. Under the umbrella of this guiding document, and further solidifying it, the Alliance is now launching the first two in a series of technical specifications, being: OSSA Application Interface Specification This technical specification (available to OSSA members only) defines a set of four interfaces which collectively enable third-party software applications to run on video security cameras following the Technology Stack. The input stream describes the video frames and messages the applications can subscribe to. The web API describes how applications can make use of the camera’s webserver to support, configuration and data upload to the application. The system APIs provide system information regarding OS version, capabilities and information about the video security camera. This is needed to understand the features and APIs that are available on the cameras to make use of device-specific functionality. The streaming application model allows applications to interact with each other. Apps can share their results, such as events and scene descriptions, with other apps on the device or (video management) software in the network. OSSA Compliant Device Definition Specification This technical specification sets the core system requirements for video security cameras following the OSSA Technology Stack to provide a basis of trust and for app interoperability across vendors. This spec is publicly available. The First “Driven by OSSA” Commercial Cameras Camera manufacturers have started to introduce to the market, devices designed to reduce fragmentation and orchestrate harmony within an open ecosystem for the surveillance industry. The first manufacturers to launch cameras based on OSSA’s Technology Stack include Topview/Qisda, Ability/AndroVideo, Bosch (through their INTEOX camera line), VIVOTEK and Hanwha Techwin. The first commercially available products based on the specifications set forth by the Alliance, OSSA will receive a signage mark for video security cameras. Companies that use this “Driven by OSSA” signage: Are full OSSA members; have signed the OSSA by-laws guiding amongst other things minimum requirements regarding data security and privacy protection. Follow the OSSA Technology Stack for video security devices that prescribes the use of an open operating system (OS). Security & Safety Things, an OSSA member company, developed the open OS and made it available to OSSA members. Ensure seamless connectivity within one centralized digital marketplace. Offer the ability to install and execute third-party apps on their cameras. One Centralised Digital Marketplace OSSA is driving the creation of one centralized marketplace to unite demand and supply in the market. Camera devices that are built in accordance with OSSA’s Technology Stack, so-called “Driven by OSSA” devices, can benefit from this marketplace which consists of (1) a development environment (2) an application store and (3) a device management portal. System integrators, using the application store, can deploy available apps across devices, in a brand independent manner, to meet specific customer requirements. App developers will find in the development environment comprehensive tools, documentation and libraries to develop new software applications. These new apps can then be offered for sale through the application store. “This is an exciting time for security and safety professionals as the main industry players pivot together in a new direction based on digital connections afforded by the IoT,” said Johan Jubbega, President, Open Security & Safety Alliance. “In these current times of global change and uncertainty, it’s of vital importance that we persist in our quest for new market opportunities and current market efficiencies, and we’re proud to be facilitating this movement that is shaping the future of the security and safety systems environment.”

What’s New with Video Management Systems (VMS)?
What’s New with Video Management Systems (VMS)?

Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?

Related white papers

How To Overcome The Storage Challenges Of Adopting Surveillance AI

Five Things To Consider For AI With Video Technology

Making Your Surveillance Cyber Secure