TeleEye Video Surveillance Cameras(16)
TeleEye MX851-HD incorporates a powerful combination of IR lens, IP66 weather proof protection, true day/night functionality and high definition multi-stream coder to be deployed on different applications. The world's first multi-stream coder for HD videoMX851-HD HD Video Camera incorporates TeleEye's high acclaimed proprietary multi-stream compression technology HD SMAC-M to generate 4 independent video streams and allows simultaneous HD video recording and fast video transmission via LAN, broadband or mobile networks. With this coder, the MX851-HD benefits from HD live video recording while maintaining an outstanding transmission with the resolution of 1280x720p on Internet and mobile devices. The maximum resolution can reach up to 1600x900 pixels. This is 3 to 5 times more pixels than standard resolution IP camera.Wider view and superb video qualityMX851-HD records HD video with a wide screen aspect ratio of 16:9. The wide screen format offers 33% more viewing area than traditional analog cameras. It provides a wider coverage and greatly reduces blind spots in the surveillance system.Video surveillance everywhereThe MX851-HD keeps your eyes on while you are on the move. The HD SMAC-M video coder provides independent stream for mobile viewing via TeleEye iView using mobile devices, such as iPhone, iPad and Android phones. The TeleEye iView mobile monitoring solution delivers live video through Wi-Fi or mobile data networks.Total solution for HD video surveillanceMX851-HD forms a part of our complete end-to-end HD video management solution by working with TeleEye HD Video recording servers and video management applications. The whole TeleEye HD surveillance solution gives users peace-of-mind and they do not need to be concerned about the compatibility of various modules coming from different vendors.Add to Compare
1/3 inch, Colour, 480 TVL resolution, Auto Iris, Direct Drive, 0.3 lux, 12 V DC, C/CS mount, Back Light Compensation, Auto Gain Control, White Balance, 1/50 (1/60) ~ 1/100,000, 48, 1.0 Vp-p, 75 Ohms, 200 mA, 120 x 68 x 58, 390, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour, 550 TVL resolution, Auto Iris, 0.15 lux, 12 V DC / 24 V AC, C/CS mount, Back Light Compensation, Auto Gain Control, White Balance, 1/50 (1/60) ~ 1/100,000, 50, 1.0 Vp-p, 75 Ohms, 99 x 60 x 49, 250, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour, 540 TVL resolution, Auto Iris, Direct Drive, 0.01 lux, 12 V DC / 24 V AC, C/CS mount, Back Light Compensation, Auto Gain Control, White Balance, 1/50 (1/60) ~ 1/100,000, 50, 1.0 Vp-p, 75 Ohms, 99 x 60 x 49, 250, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour, 540 TVL resolution, 0.08 lux, 12 V DC / 24 V AC, C/CS mount, Wide Dynamic Range, Back Light Compensation, Auto Gain Control, White Balance, 1/50 (1/60) ~ 1/100,000, 50, 1.0 Vp-p, 75 Ohms, 300 mA, 115 x 62 x 58, 330, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour, 540 TVL resolution, 0.8 lux, 12 V DC, 3.7, Wide Dynamic Range, Back Light Compensation, Auto Gain Control, White Balance, 1/50 (1/60) ~ 1/100,000, 50, 1.0 Vp-p, 75 Ohms, 200 mA, 42.3 x 43.5 x 43.5, 140, -10 ~ +50, 0 ~ 90Add to Compare
Browse Video Surveillance Cameras
- Auto Iris
Surveillance camera products updated recently
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
CCTV manufacturer TeleEye has helped tackle illicit rubbish dumping and fly-tipping throughout 15 local authorities in the Republic of Ireland.TEC Security Services installed TeleEye CCTV transmission systems to allow remote operators to view live images and record evidence of unlawful littering at multiple recycling points and common fly-tipping sites. An in-built audio facility enables the operators to give verbal instructions to legitimate site users or issue warning messages to litter louts - a feature cited by TEC Security as essential to the system's effectiveness.Recycling points are often swamped with dumped boxes and bags used to hold the recycling. If this happens at a TEC Security managed site, the offender is requested to remove the litter with an automated message stating, "This is the Council. We see that you are dumping your bags. Please put them back in the car." In most cases this is sufficient to get the offender to comply. Where individuals refuse to comply, their image and vehicle registration details are recorded, to establish their home address, and a fine is subsequently issued.A similar process is applied at common fly-tipping sites. In this case, offenders are notified that they are being recorded, given an on-the-spot fine of up to €150 for illegal refuse disposal and warned they could be prosecuted.The system has successfully reduced tipping and littering, saving the council literally €millions of taxpayers money on clearing up refuse and effecting prosecutions.TEC Security CEO Stephen Tyrell commented: "500 offenders have been caught in just 3 months, putting out a resolute message and practically stopping the problem in its tracks. We offer an effective service that councils need and want. The TeleEye equipment gives us the audio messaging facility and high quality evidence we need for successful prosecutions. Above all, we are pleased to help combat this anti social behaviour and make the environment a more pleasant place for everyone."
TeleEye, the leading manufacturer of CCTV transmission products, has recently negotiated a comprehensive distribution deal with ADI-Gardiner.TeleEye DVR Transmitters send CCTV video from a security installation to a central, fixed location or remote video response centre (RVRC). The DVR Transmitters are all BS8418 compliant and use SMAC-M compression technology to reduce CCTV video data for transmission and storage. SMAC-M uses 40% less hard disc space than MPEG4 compression technology and facilitates the fast transmission of high quality CCTV images across low bandwidth or highly contended network connections.TeleEye's range of DVR Transmitters includes locally and remotely operated, restricted access and rugged, transport or rapid deployment models. All the DVR Transmitters facilitate the provision of a secondary GPRS connection in case the primary broadband connection fails, ensuring transmission integrity at all times.As part of the agreement, TeleEye has introduced its revolutionary new concept of e2e (end to end) monitoring to ADI-Gardiner. This means ADI-Gardiner is able to offer customers a complete remote CCTV monitoring solution as a single part number in their new catalogue. The e2e solution includes the DVR Transmitter, broadband connection, pre-configured router, secondary GPRS connection and 24/7 monitoring from a TeleEye approved monitoring station - all with a one year, on-site warranty.Duncan Ross, UK MD of TeleEye, commented, "We are very excited about our new deal with ADI-Gardiner. Our company is one of the very few that offers a fully BS 8418 compliant product range. The e2e monitoring solution is a revolutionary package that will open up monitoring opportunities to many ADI-Gardiner customers."It would seem that this partnership is one from which installers stand to benefit significantly.
TeleEye, the Hong Kong based, world class manufacturer of CCTV surveillance and BS 8418 compliant transmission equipment, has recently appointed Andrew Jackson to the post of Account Director in the UK. Andrew has extensive security industry experience, a proven track record in business development and a wealth of knowledge relating to Far Eastern and Middle Eastern business and culture.Andrew spent 17 years with Gardiner Security (now ADI-Gardiner), working ultimately as a CCTV divisional manager. He then moved to Baxall where he specialized in export sales and business development. This role involved widespread travel around the Far East and Middle East working on many high profile security projects for airports, banks, the Military and large scale manufacturing sites - he even supplied several thousand cameras to the 2008 Beijing Olympics.Duncan Ross, UK MD of TeleEye, explained: "Excellence and experience are crucial in our selection of new staff at TeleEye and Andrew more than meets both these requirements. Initially, Andrew will be managing the smooth operation of our sales through ADI-Gardiner. His in-depth knowledge and experience of the Far East will also be invaluable to our Hong Kong development team and to launching further market leading security products. Andrew brings a wealth of security industry knowledge, expertise and success to his new post, and we are very pleased to welcome him in to our team."
Physical Security Supports A Future-Proof Cyber Security StrategyDownload
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
- Cognitec Offers Face VACS Face Recognition System To Enhance Casino Security
- FERMAX Launches MEET IP System Providing Ease Of Installation And Integration With Automation Systems
- Safer Scotland Enhances Security At A West Lothian Site With Canine Capability To Deter Intruders
- MOBOTIX Thermal Imaging Cameras And OpenView Fire Detection System Installed At Your Homes Newcastle