BQT Solutions Video Surveillance Cameras(6)
1/3 inch, Colour / Monochrome, 600 TVL resolution, Digital (DSP), Infrared, Auto Iris, Direct Drive, 0.006 lux, CS mount, 90 ~ 260 V AC, 752 x 582 , Back Light Compensation, Auto Gain Control, White Balance, 0.45 / 1.0, 1/50 ~ 1/100,000, >50, Internal / Line-lock, Zoom, 10 W, 66 x 55 x 130, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour / Monochrome, 600 TVL resolution, Digital (DSP), Infrared, Auto Iris, Direct Drive, 0.005 lux, CS mount, 90 ~ 260 V AC, 752 x 582 , Back Light Compensation, Auto Gain Control, White Balance, 0.45 / 1.0, 1/50 ~ 1/100,000, >50, Internal / Line-lock, Zoom, 10 W, 50 x 62 x 126, -10 ~ +50, 0 ~ 90Add to Compare
1/2 inch, Colour / Monochrome, 600 TVL resolution, Digital (DSP), Infrared, Auto Iris, Direct Drive, 0.0012 lux, CS mount, 90 ~ 260 V AC, 752 x 582, Back Light Compensation, Auto Gain Control, White Balance, 0.45 / 1.0, 1/50 ~ 1/100,000, >50, Internal / Line-lock, 10 W, 66 x 55 x 130, -10 ~ +50, 0~ 90Add to Compare
1/3 inch, Colour / Monochrome, 600 TVL resolution, Digital (DSP), Infrared, Auto Iris, Direct Drive, 0.005 lux, CS mount, 90 ~ 260 V AC, 752 x 582, Back Light Compensation, Auto Gain Control, White Balance, 0.45, 1/50 ~ 1/100,000, >50, Internal, line-lock, 10 W, 50 x 62 x 126, -10 ~ +50, 0 ~ 90Add to Compare
Browse Video Surveillance Cameras
- Auto Iris
- BQT Solutions
Surveillance camera products updated recently
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
Large event venues spend significant resources on physical security, and the vast majority invest in video surveillance systems as a way of monitoring public areas such as parking lots, garages and seating, as well as “backstage” areas such as loading docks and offices. Even though the camera footage is often preserved for investigating incidents, for the most part, video footage goes untapped because – realistically – security staff cannot constantly and efficiently monitor cameras in real-time or review the high volumes of archived video. Video Analytics Powered by Artificial Intelligence Increasingly, event venues are overcoming this challenge and maximizing this video data by investing in intelligent video surveillance. In this article, I’d like to explore how the combination of traditional surveillance and groundbreaking video content analytics enables event venues to not only optimize physical security and safety, but also improve customer service, streamline operations, and gather valuable business intelligence. Deep learning and artificial intelligence-based video content analytic systems detect, identify, extract, and catalog all the objects that appear in video footage, based on classes and attributes such as gender, appearance similarity, color or size. This – along with behavioral detection, such as object interactions, dwell times, and navigation paths, as well as face and license plate recognition – enables searchable, actionable and quantifiable analysis of video. The technology makes it easy for users to accelerate post-event investigations, improve situational awareness, and derive critical business insights from video data. Accelerate post-event investigations, improve situational awareness, and derive critical business insights Accelerating Investigations and Real Time Response Where there are crowds, it’s not uncommon for medical or criminal incidents to transpire. In the aftermath, security teams must quickly understand the scene and, by making video searchable, video analytics helps them efficiently gather information or evidence from multiple camera. Whereas a manual search of video footage would require hours, if not days, of valuable time and staff resources – while being subject to human error – a video content analytics system enables effective multi-video search using a variety of filters, so that post-incident investigations can be focused and, thereby, accelerated. For instance, if witnesses claim that a man in a yellow shirt caused a disturbance and then drove away in a blue pickup truck, security could filter video to review instances where people or vehicles matching those descriptions appeared, and then focus their investigation on relevant video evidence. For the same example, if the perpetrator was still at large in the venue, security managers would want to track the person’s movements and, ultimately, apprehend him. Using the same cataloged metadata that drives video search, intelligent video surveillance accelerates real-time response to developing situations from threats and suspicious behaviors to emergencies, or even any behavior that requires closer monitoring or intervention. Something as mundane as an unwieldy queue forming at a concession stand, can translate into alerting logic that increases operators’ situational awareness and ability to effectively intervene when time is of the essence. By understanding developing situations in real-time, they can respond more quickly to prevent or solve a problem. Rule-based real time alerts Users can configure rule-based real-time alerts, based on specific scenarios – such as when people counts in the defined space next to the cashier are higher than the specified threshold, indicating a queue, or when vehicles are detected dwelling in a no-park zone or sensitive security area. In the case of the offender in the yellow shirt, security could configure alerts to notify for appearances of men in yellow shirts or blue pickup trucks within the event complex. If they’re able to extract the perpetrator’s face or license plate from the video search, security officers can also identify and track the specific person and vehicle of interest. Intelligent video surveillance users can compile “watchlists” Object recognition is helpful for tracking specific, identified threats, but it can also be leveraged for locating missing persons or vehicles or offering VIP services to guests who comply. Intelligent video surveillance users can compile “watchlists” – that include persons of interest, such as past agitators, recognized criminals or terrorists, missing persons or VIPs – to be alerted when matches for these faces appear in video. Face recognition can also be used to differentiate recognized employees from visitors that are not authorized to be in certain spaces, to prevent security breaches. Because camera conditions aren’t always optimal for “in the wild” face and license plate recognition – where lighting conditions or camera angles don’t always allow for a pristine face or plate capture – it is critical to have a comprehensive video content analysis tool for triggering alerts based object classifications and non-personally-identifiable parameters is critical. Optimizing Operations Based on Business Intelligence While having real-time situational awareness is crucial for proactive intervention to developing situations, understanding long-term activity and trends can be equally important for an events venue or stadium. With video analytics, video surveillance data can be aggregated over time to generate statistical intelligence, trend reports, and data visualizations for operational intelligence. This capability transforms video surveillance from a siloed security tool to an intelligence platform with broad value for business groups across the organization: Marketing departments can gain visitor demographic information for targeted advertising and product placements. On-site retailers can uncover how visitors navigate their stores and the products or spaces that draw the most attention. Property management can follow heatmaps demonstrating where visitors dwell and the durations they stay at certain exhibits or areas, to base rental and leasing fees on actionable and quantifiable intelligence. Operations managers can more effectively plan and hire staff for events, by analyzing visitor traffic trends, entry and exit points and occupancy statistics. Video surveillance data can be aggregated over time to generate statistical intelligence For these reasons and more, event organizations that already rely on CCTV networks, should consider how to better leverage those existing investments to deliver substantial value across the organization: By making video searchable, actionable and quantifiable, intelligent video surveillance empowers event managers to enhance public safety and physical security, while also streamlining operations and improving customer service.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at ISC West - Las Vegas, booth 25103. ISC West is the largest converged security industry trade show in the US with the exhibition taking place from April 10-12th. The event provides a major platform for professional networking, sourcing new suppliers and introducing new products and technologies, encompassing everything from access control to unmanned vehicles. ISC West also includes the SIA Education@ISC conference program, running from April 9-11th. Risk Management Services Ava Group’s technology division incorporates two well established security risk management companies - Future Fibre Technologies (FFT) and BQT Solutions, both of which will be on the booth this April. As a provider of risk management services and technologies, Ava Group offers a portfolio of complementary solutions encompassing both fiber optic intrusion detection as well as high security access control and locking. Ava Group is proud to present the latest solutions from its technology division, namely the Orca lock and latest enhancements to the Aura Ai-2 controller Ava Group is proud to present the latest solutions from its technology division, namely the Orca lock and latest enhancements to the Aura Ai-2 controller. The enhanced Aura Ai-2 from Future Fibre Technologies features unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range. Outdoor Locking Solution This product features new ultra-low noise optical detection electronics. This ensures a single controller can cover a distance up to 110 kilometers, accurately detecting, locating and reporting multiple disturbances to just +/- two meters. BQT Solutions will be demonstrating the new high-strength Orca lock (YG80) – providing ultimate security for all environments. Building on the success of the award winning YG10, the Orca lock is designed for securing gates, roller doors, shipping containers and any other large door or entryway. Alongside the Orca’s impressive physical attributes, a unique feature is its ability to fully integrate into an access control system, surpassing any other solutions available in the market. Orca is fully monitored, weatherproof, and user configurable - providing the perfect indoor and outdoor locking solution. Real-World Projects The Ava Group team will be on hand to explain how its solutions are being used in real-world projects to address the latest threats As well as getting to know the product range, the Ava Group team will be on hand to explain how its solutions are being used in real-world projects to address the latest threats. Newly appointed Chief Operating Officer, Scott Basham commented, “We’ve seen continued growth in demand for our products in the US market and returning to ISC West provides us with a perfect platform to showcase our broad range of capabilities and explain to visitors how our product range can be applied to meet their particular needs. We always welcome the opportunity to be face-to-face with our customers worldwide and thoroughly enjoy being able to engage directly with the market in this way.” Fiber Sensing Technology Alongside their presence in the exhibition hall, Ava Group’s CTO – Technology, Dr Jim Katsifolis will be presenting ‘Fiber Optic Perimeter Intrusion Detection Systems (PIDS): Trends, Myths and Realities Revealed’ 10:15 am on April 9th, Sands 302. This presentation promises to cover how best to select appropriate fiber sensing technology products when specifying, as well as how to assess the true performance of such PIDS systems. With over 1,000 exhibitors and brands and an anticipated 30,000 security professionals, ISC West is a must-visit for anyone in the security risk industry.
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (FFT) and BQT Solutions. As a provider of risk management services and technologies, Ava Group offers a portfolio of complementary solutions encompassing both fibre optic intrusion detection and high security access control and locking. Increased Investment As a key event for the region and beyond, Intersec Dubai is the perfect way for security providers and buyers to start 2019" Mark Horton, Global Sales & Marketing Director commented, “As a key event for the region and beyond, Intersec Dubai is the perfect way for security providers and buyers to start 2019. Our solutions offer the very latest in security technology and the highest levels of protection, key benefits that we know are always well-received by visitors at the event.” Mark continued, “Over the last couple of years we have seen a significant growth in demand for our products in the Middle East, with increased investment in infrastructure across the region as a whole. Because of continued growth in the market, we have also invested in the expansion of our Dubai-based office and regional support team to ensure we are perfectly placed to supply and service our customers.” Reporting Multiple Disturbances Future Fibre Technologies will be showcasing its enhanced Aura Ai-2 controller. Featuring unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range - this product features new ultra-low noise optical detection electronics. This ensures a single controller can cover a distance up to 110 kilometres, accurately detecting, locating and reporting multiple disturbances to just +/- two metres. Also on stand S3-C48, BQT Solutions will be demonstrating the new high-strength Orca lock to the middle east market Also on stand S3-C48, BQT Solutions will be demonstrating the new high-strength Orca lock to the middle east market. Building on the success of the award winning YG10, the Orca lock is designed for securing gates, roller doors, shipping containers and any other large door or entryway. Alongside the Orca’s impressive physical attributes, a unique feature is its ability to fully integrate into an access control system, surpassing any other solutions available in the market. Security Risk Management Orca is fully monitored, weatherproof, and user configurable - providing the perfect indoor and outdoor locking solution. As well as the products themselves, the Ava Group team will be on hand to explain how its solutions are being used in real-world projects to address the latest threats. Mark concluded, “We are looking forward to discussing recent key examples of our technology in action, including a major military closed data network where our data network infrastructure protection solution is protecting against tapping and tampering. These projects illustrate the depth of our expertise in security risk management and highlight the level of protection which we achieve to client’s assets and infrastructure. If you are visiting the event come and have a chat with our friendly and expert team on Stand S3-C48 about your specific security needs.”
Ava Group (AVA), global provider of security risk management services and technology will be presenting its portfolio of security solutions at International Security Expo, stand E74. The expo also hosts a range of certified conferences and workshops covering every major sector of the security industry. Taking place over two days at London Olympia, the event focuses on the needs of government and CNI amongst other key sectors. Fiber Optic Intrusion Detection Ava Group will be showcasing the latest solutions from its technology division - incorporating Future Fibre Technologies and BQT Solutions. The Ava Group is a market leader of risk management services and technologies, offering a portfolio of complementary solutions encompassing both fiber optic intrusion detection and high security access control and locking. Mark Horton, Global Sales & Marketing Director – Future Fibre Technologies commented, “Our brands have a strong pedigree in some of the expo’s key sectors including government and CNI, and we’re very much looking forward to discussing with visitors how Ava’s solutions can be applied to protect their organizations. Ava Group has had some major project wins in recent months including a major military closed data network, who have selected our data network infrastructure protection solution to secure its network against tapping and tampering. It is projects such as this that demonstrate Ava Group’s expertise in security risk management and protection of client’s assets and infrastructure.” Perimeter Security Technology New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres Ava Group’s CTO – Technology, Dr Jim Katsifolis will be presenting in the Perimeter Security & Intrusion Detection Technology Workshop on ‘Security within security in a converged perimeter intrusion detection solution’ on the first morning of the exhibition. An accomplished R&D professional, Jim will explore the latest generation of PIDS technologies, the convergence of intrusion detection and cybersecurity as well as addressing some common myths in this field. Featured on the stand will be the enhanced Aura Ai-2 controller from Future Fibre Technologies. This market-leading product offers unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range. New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres and can accurately detect, locate and report multiple disturbances to +/- 2 metres. Security Management Solution Ava Group is also previewing its Small Site Assurance range, which is designed to protect remote unmanned locations through a holistic security management solution. The solution incorporates intrusion detection, access control and locking as well as environmental monitoring - all controlled remotely from a simple graphical user interface. The Small Site Assurance range is particularly suited for utilities, telecoms, energy, oil & gas and data centers that are at risk from threats such as vandalism, opportunistic and targeted theft, terrorist attack, trespass, system failure, accident or injury. Orca Locking Security Solution The Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway From BQT Solutions, Ava Group will be demonstrating the Orca lock. Building on the success of the award winning YG10, the Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway. Alongside the Orca’s impressive physical attributes, its ability to integrate into an access control system is what elevates it beyond anything available in the market. Fully monitored, weatherproof, and user configurable, the Orca is the perfect indoor and outdoor locking solution. BQT will also demonstrate the latest software integration between its miPASS Access TMS software and Paxton’s Net2 access control software. The integration enables the seamless addition of BQT biometric readers to new or existing Net2 systems, facilitating a smooth transition from less secure card technologies to more robust options like fingerprint biometrics and BQT’s own miPASS credentials.
Related white papers
How To Overcome The Storage Challenges Of Adopting Surveillance AI
Five Things To Consider For AI With Video Technology
Making Your Surveillance Cyber Secure
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload
Salient Systems Equip Constellation Cannabis With The Right Solution To Meet The Stringent Regulatory Demands Of Its Industry
FLIR PT-Series Cameras And SpotterRF Compact Surveillance Radars Provide Enhanced Perimeter Protection For Electrical Substations
- Salient Systems Equip Constellation Cannabis With The Right Solution To Meet The Stringent Regulatory Demands Of Its Industry
- Synectics To Provide Integrated Surveillance Solutions For Prestigious Sites Across London
- FLIR PT-Series Cameras And SpotterRF Compact Surveillance Radars Provide Enhanced Perimeter Protection For Electrical Substations
- Eagle Eye Networks Completes Citywide Surveillance Program Of Installing Cameras In Mexico City