Pan tilts - Expert commentary

Overcoming Challenges And Mapping The Future Of Video Surveillance
Overcoming Challenges And Mapping The Future Of Video Surveillance

Over the last year, we have continued to see the rise of manufacturers from China in the mid- to low-end market for video surveillance - a trend that currently shows no signs of tapering. Additionally, the shift from analog to IP systems has remained consistent, with end users increasingly looking to network-enabled devices to mitigate risk from both a physical and cyber perspective. Complex network attacks in 2016 demonstrated the need for increased network security for network-connected devices such as IP cameras and network video recorders. More and more manufacturers are considering the potential for such attacks when designing updates for existing hardware and software technology, strengthening password requirements, incorporating robust data encryption, and educating integrators and end users on how to put protocols in place to protect the valuable information being collected. Increased Security Collaborations Today’s surveillance technology - and the new innovations right around the corner - incorporates more IT protocols in response to high-profile cyber incidents. As a result, IT standards will finally start being adopted by security system manufacturers over the course of the next few years. At the same time, we'll see increased collaboration between IT and security leaders within enterprises. Intelligent, Big Data Analysis Video technologies such as panoramic 360-degree cameras with advanced dewarping capabilities are being rapidly adopted, along with video analytics software that enables the extraction of data for business intelligence, apart from just security video. The future includes more widespread availability of cloud technologies and services. In 2017, we can look forward to the more widespread adoption of intelligent analytics and big data analysis, which has the potential to streamline processes and optimize sales operations for organizations to drive new levels of business intelligence. See the full coverage of 2016/2017 Review and Forecast articles here Save

Getting Crisis Management And Emergency Planning Requirements Right
Getting Crisis Management And Emergency Planning Requirements Right

Think of crisis management and emergency planning as a  customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it? Developing and writing a corporate or organizational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is supposed to take forever, and it should never go onto a shelf where no one might ever look at it again. “Emergency planning for crisis management is never finished,” Fagel said. “Security is a process, a continuing task that you modify and refine to meet changing circumstances, while continuing to work on improving the overall system.” Fagel has spent nearly four decades in fire, rescue, emergency medical services, law enforcement, public health emergency management and corporate safety and security. His experience includes responding to crises and disasters including the Oklahoma City Bombing and the World Trade Center in the wake of the 9/11 attacks. He also led a team of experts that authored the 2013 book “Crisis Management and Emergency Planning: Preparing for Today’s Challenges,” which was published by CRC Press, Taylor & Francis Group. For Fagel, the security process moves forward through clear communications. “Emergency planning is a culture with a communications methodology, where people in a hierarchical structure or chain of command work together to make things work.  “By communications, I don’t mean radios, email and texting. I mean talking face-to-face and person-to-person. Think of crisis management and emergency planning as customer service. You, as my customer, make me understand what you need, and I provide it.” But It Won’t Happen Here The worst probably won’t happen, but something will undoubtedly happen. Maybe it won’t be 9/11, but there will be a crisis. So you need a plan, one that evolves and keeps pace with your organization’s risks and vulnerabilities. And you need your plan now. “Crisis management begins before the crisis,” said Fagel. “You can’t pass out your crisis manager business cards as the police arrive in response to an active shooter or bomb threat at your facility. According to crisis management authority Michael J. Fagel, emergency planning is supposed to take forever “You need to form relationships with first responders far ahead of time. You as the crisis manager must sit with the head of security and the building or campus manager and talk about and develop the plan.” Then you have to practice or drill the plan, continued Fagel. As your town’s crisis manager, what will you do if you lose the only hospital you have in your small town? Figure out what that means: It means that your response time to medical emergencies has grown from minutes to unacceptably high, because your town’s two ambulances must deliver patients to the hospital in the next town, which is 40 miles away. You should have talked to the EMTs and asked them what equipment they would want if you had to put together a couple of temporary ambulances. You would also have to find vehicles. Would the police lend you two vans? Do you live in a tornado alley? What happens if a tornado tears into your town’s middle school? Do the schools have a plan? You should probably talk to them about linking their plans with yours. “Crisis management and emergency planning require discussions, information, problem solving and facilitation ahead of time on a continuing basis,” says Fagel. “What are the risks and vulnerabilities? How can you mitigate risks and vulnerabilities? A crisis manager thinks and communicates about these issues daily, imagining what might happen and how to respond.” Currently, Fagel teaches courses in homeland security, terrorism, biodefense and other crisis management and emergency planning subjects at the Illinois Institute of Technology-Stuart School of Business, Masters in Public Affairs Program. He teaches similar courses at Northwestern University in the Masters of Public Policy and Administration Program. He also teaches courses in masters programs at Northern Illinois University, Benedictine University and Eastern Kentucky University.

IP Network Requirements For Video Surveillance/physical Security
IP Network Requirements For Video Surveillance/physical Security

IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world, corporate IT networks are not only expanding to meet accelerating demand, but also to include more users and applications. As businesses use information technology (IT) to collect data from every corner of their business, the term “LAN sprawl” has been suggested to describe the multi-dimensional growth that is putting new stresses on the corporate network. One of the issues that comes with the expansion of local area networks (LANs) is how to control the network infrastructure, especially in relation to allowing users to access data.Given the transition of the physical security industry to systems based on Internet protocol (IP), often that data traveling along the enterprise LAN is related to physical security, including video surveillance. Video data can challenge networks both because it uses a lot of bandwidth and because the user has a high expectation of real-time video without latency. As growing networks accommodate the demands of more users and applications, it has become increasingly difficult for a video surveillance or security system to operate effectively. Many companies are concluding that the best approach is a separate IT infrastructure that is dedicated to video and other security systems.As the amount of network information flowing at any given time can lead to recording and viewing problems, video security systems should have their own network rather than running on a shared database. This approach can also take advantage of IT networking innovations designed specifically for the video and physical security marketplace. Advantages of a separate IP Network  for surveillance videoTraffic on a video-specific network does not have to compete with other network data or deal with video quality issues. Dedicating a separate network to video applications enables the system to be designed especially for that purpose, including use of technologies to maximize functionality and dependability. Traffic on a video-specific network does not have to compete with other network data Performance-maximizing technologies for video networks include devices to monitor the efficient operation of the network. Such devices take into account variables such as power, environmental conditions and bandwidth usage. Network technologies designed for security/video systems can also facilitate integration of a range of security-related functionality.The Unique Needs Of Physical SecurityPhysical security information systems, including video, are critical to a company's security operation and general well-being. The security mission requires fail-safe systems that operate dependably over long periods of time, as well as those that are ready to respond when needed. Security systems also must be scalable, flexible and able to adapt to a company's changing protection needs, and should not have to compete for network resources with the growing number of other applications and users on the enterprise network.Video’s bandwidth and system needs are too extensive for it to be relegated as part of an already overburdened corporate network infrastructure. Security has historically operated separately from other corporate functions, an arrangement that supports its distinctly focused mission and enables information systems for video and security applications to operate effectively and mostly independent of other corporate operations. The security market has unique needs. Not all IT is suitable or appropriate for IP video surveillance. It takes specialized equipment to meet the specific needs of the video and security market.

Latest Axis Communications news

Milestone Systems Hosts The 2020 Milestone Integration Platform Symposium (MIPS), Texas
Milestone Systems Hosts The 2020 Milestone Integration Platform Symposium (MIPS), Texas

Milestone Systems’ annual MIPS brings together a rich community of video, security, and technology solution partners focused on advancing innovation. Special guests including Milestone officers, industry leaders, renowned futurists, authors, and a popular TEDx speaker will share their inspirations. Milestone will also showcase three start-ups from its Kickstarter Contest with compelling technologies and businesses that comprehensively address pressing security and societal issues. Milestone Systems, a global provider of open platform video management software (VMS), is hosting the 2020 Milestone Integration Platform Symposium (MIPS) conference, in Dallas, Texas on February 17-19, 2020. Partners, customers and influencers are invited to register for the special two-day event. Applied innovation in video surveillance Milestone will feature a variety of speakers and topics, including TEDx speaker Anders Sorman-Nilsson, and one of the Top Ten Futurists in the world, Gerd Leonhard. The event will also include an exhibition pavilion featuring products and programs from partners including Axis Communications, Dell, Intel, Herta, Lenel S2, and Seneca Data and an innovation showcase with the three most promising ideas from Milestone’s incubator program, Kickstarter. We glimpse at the future through the ideas of our Kickstarter contestants" “MIPS is a one-stop destination for applied innovation in video surveillance,” notes Tim Palmquist, Vice President for the Americas at Milestone Systems. “Each year we hear from an array of speakers that challenge our thinking about today’s technology and the new frontiers of tomorrow. We see new products and programs from the most innovative companies in our industry. Together with XProtect, they serve the needs of our many customers. Finally, we glimpse at the future through the ideas of our Kickstarter contestants. MIPS is a hub for business, network connections and, above all, novel ideas!” Video analytics Leveraging the power of the open platform, the Milestone XProtect video management software (VMS) is compatible with more than 8,500 security and surveillance devices, and more than 450 software integrations from over 3,500 technology partners. Technology partners include providers of network video cameras, cloud solutions, DVRs and NVRs, servers and storage equipment, alarm and detection systems, video analytics, GPS technology, laser and radar scanners, emergency call boxes and more. “The open platform provides an opportunity to innovate freely as circumstances and opportunities dictate, not as a VMS provider dictates,” says Palmquist. “This freedom of innovation has already yielded some of the very best technologies and collaborations in the security industry. It has also resulted in scalable and future-proof systems in healthcare, education, city surveillance and other verticals where Milestone is the platform of choice and where professionals accept nothing less than freedom of choice to do their jobs at the best of their capacity.” Milestone Marketplace 2.0 Integrators will promote their installation experience and connect with technology partners on Marketplace Milestone will launch version 2.0 of the Milestone Marketplace on its website which will enable customers to find resellers and integrators that deliver video solutions based on their pain points or location. Integrators will promote their installation experience and connect with technology partners on Marketplace hereby allowing end-users to access information on the latest innovations. “By launching Milestone Marketplace 2.0, we are inviting customers to search for the latest and greatest technologies in our community. Milestone supports the co-creation of solutions, allowing our community to supply best-in-class technology for a variety of customer needs,” says chief sales and marketing officer at Milestone, Kenneth Hune Petersen. Integrated cloud-based solutions A large part of the MIPS 2020 Dallas event focuses on the many advantages of an open solution, with the Milestone XProtect VMS platform enabling reliable and efficient integrations with thousands of third-party hardware and software products. Detailed discussions of solution applications as well as previews of new integrations and partnerships help integrators, resellers and partners of all types to shape the future of their own businesses. Cloud-based services and integrations will soon take video management systems to a new level MIPS 2020 promises to usher in new integrated cloud-based solutions, which will greatly impact the future of how video systems are designed, deployed, and monetized. Cloud-based services and integrations will soon take video management systems to a new level, expanding how security professionals think about technology and their own business models. Open for startups Additionally, three finalists in Milestone's annual Kickstarter contest will demonstrate their visions. MIPS 2020 participants will have an opportunity to vote for their favorite software coder with the winner being announced during the gala dinner. Milestone believes in inspiring talent to make the world see through connecting new technology ideas, business strategy, and innovation. Three 2020 finalists will have a chance to showcase their visions directly to the Milestone Community of partners and customers at the MIPS2020 conference and beyond. They are: Benoit Koenig is the co-founder and COO at Veesion. Benoit was confronted with shop-lifting on a regular basis in his family-owned supermarkets. During his studies in Artificial Intelligence, he saw the great potential of deep learning applied on video data, which inspired him to start Veesion with two other engineers. Veesion are developing a gesture recognition technology to detect shoplifting in the retail industry. Commenting on Benoit’s idea and company, Palmquist noted, “Veesion is what MIPS is all about. This is an innovation that addresses a major commercial issue for retailers around the world but does so using technology in a respectful, considerate and intelligent manner. I am proud and encouraged that Veesion is enabled by the open platform.” Jennifer Ivens is the founder of Canscan, a technology company that provides automated container inspection services. It was impatience and ambition that prompted her to leave her position as a logistics analyst for an ocean carrier to go into this business for herself. Canscan’s idea is the next-level shipping container checking system, powered by artificial intelligence (AI) called Virtual Checker. “Jennifer and her team have come up with an innovation that addresses many social, economic, and criminal issues. It has the potential to avert some of the human tragedies we hear of and see on television across the globe each year,” Palmquist said. Zeljko Tepic has over 15 years of experience in the development of client/server and cloud architectures. He works on projects involving advanced algorithms, signal processing, Artificial Neural Networks, deep learning, generic algorithms, fuzzy logic, spectral analysis, and more. Venzo Secure’s idea is to provide seamless awareness of critical events by transparently displaying an intuitive “alert timeline” on top of the XProtect Smart Client camera views. The solution will give customers the option to dynamically arrange a view of the cameras in the Smart Client which are closest to the event at hand, and to handle any related events, alarms, analytics or metadata inside the Milestone XProtect video platform, including those from third parties. “Smart city managers, emergency responders, and police will benefit from this new technology enabling them to better respond during a crisis. This technology is poised to save lives, and I am proud that Milestone is supporting Venzo through our Kickstarter program,” commented Palmquist. Over 750 attendees are expected to attend MIPS 2020 at The Gaylord Texan Resort and Convention Center on February 17-19, 2020 in Dallas, Texas.

Why The Security Of Retail Systems Is Key To Building Long Term Customer Trust
Why The Security Of Retail Systems Is Key To Building Long Term Customer Trust

Cloud technologies and the IoT have opened up seemingly endless possibilities for the modern retail organization. Customers have never had as much control over purchasing decisions as they do today, with the ability to make transactions at the touch of a button for goods and services from the comfort of their own homes or on the move. However, the customer data lying at the heart of this frictionless shopping experience presents an ever more attractive commodity to cyber criminals. Attacks are growing in number and it has been reported that in the last 12 months there have been 19 significant data breaches. This presents a major problem for both retailers and customers. Cloud technologies and the IoT have opened up seemingly endless possibilities for the modern retail organization In addition to the immediate disruption and downtime a breach can cause, the damage to the reputation of a business or brand can be lifelong. With GDPR related fines from the ICO now as much as €20m or 4% of an organization’s global annual turnover, whichever is higher, the resulting combination of the cost of the breach itself, reputational erosion and any crippling fines can be devastating. It is therefore essential that retailers are aware of the steps and procedures they should be following to ensure full data compliance and to guarantee the integrity of their IT infrastructure. Ensuring full GDPR compliance It’s vital to ensure that everyone understands the security implications and knows how to respond effectively in the event of a breach. Internally, all teams and departments should have the confidence to raise the alert if a breach is suspected. Externally, companies should look to encourage conversations across the entire supply chain to ensure requirements are effectively met and security risks are adequately addressed. It is a requirement of the GDPR that the necessary steps be taken to guard against attack and protect existing software and systems It is a requirement of the GDPR that the necessary steps be taken to guard against attack and protect existing software and systems. Effective cybersecurity lifecycle management of IoT devices, such as network video surveillance cameras, is an example of a measure which should be put in place to help prevent such devices from being compromised, mitigating risk and ultimately maintaining customer trust. Establishing a truly secure retail solution can only be accomplished if security has been analyzed at every stage. Evolving physical systems For protection of the physical retail environment, the move away from legacy security solutions such as traditional CCTV, which typically sat outside of a company’s IT operation, to the modern cloud-enabled security technologies we see today, allows retailers to unlock a wealth of business benefits previously impossible with analog technologies. Today’s systems provide far greater accuracy of detection, vastly improved image quality, even in low light, and an array of business intelligence options to aid operations, such as people counting, queue monitoring and stock control. Protecting the physical security of the retail environment The ability to create live security alerts as well as forensic evidence for later analysis allows security teams to be proactive rather than reactive. In addition, the growing use of edge capabilities to process data within the cameras themselves negates the additional time and potential lag associated with continually passing surveillance information back and forward to servers, streamlining and therefore vastly improving operations. System vulnerabilities equals vulnerable data For network cameras being introduced onto an IT network, it’s essential to ensure that they do not become compromised and used as a backdoor to gain entrance to a business’s innermost workings and most valuable commodity; its data. The importance of guarding against system vulnerabilities cannot be ignored and it is therefore vital to ensure that all installed technologies are Secure by Default; built from the ground up with cybersecurity considerations at the forefront, to strengthen system security. In addition, software updates and firmware upgrades will keep the devices protected in line with the evolving threat landscape. The importance of guarding against system vulnerabilities cannot be ignored Forging and maintaining relationships with stakeholders is key to establishing a healthy supply chain built on mutual trust and respect. Only by following such an approach can the integrity of systems be fully guaranteed, with trusted vendors and installers working together to ensure that ethical practices are followed, and cybersecurity principles are adhered to. Due diligence should be carried out to make sure that all stakeholders involved in the manufacture, supply and installation of security software and systems understand the importance of keeping security best practice at the forefront of everything they do. Addressing the ongoing challenge Retailers must be able to rely on technologies that support their operational requirements and address associated risks, while at the same time, supporting IT security policies. By following procedures around the cybersecurity of IoT devices, and realising the importance of implementing high quality products and services through relationships with trusted vendors and partners, retailers will benefit from connected physical security systems that deliver on the promise of better protection of the business and customer, to effectively mitigate the mounting cyber security threat.

Messe Frankfurt Middle East Hosts Intersec 2020, Where The Global Security Industry Converges
Messe Frankfurt Middle East Hosts Intersec 2020, Where The Global Security Industry Converges

Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Matrooshi, Director General of Dubai Civil Defense; Major General Abdullah Ali Al Ghaithi, Director of the General Department of Organizations Protective Security & Emergency at Dubai Police, and Major General Khalifa Ibrahim Al Sulais, CEO of the Security Industry Regulatory Agency (SIRA). Automated security solutions As the region’s premier show for commercial security, Intersec plays a crucial role in shaping the the industry" The delegation met top-level dignitaries and representatives from Dubai Police; Came, a provider of automated security solutions; Netherlands-based Nedap, a specialist in systems for long-range identification, smart parking and vehicle access control; Chinese technology giant Huawei, and Axis Communications, a Swedish manufacturer of network cameras for physical security and video surveillance industries. “As the region’s premier show for commercial security, fire protection and safety, Intersec plays a crucial role in shaping the future of these industries,” said HH Sheikh Mansoor. “Protecting our people and assets is a principal responsibility for the UAE and with the Expo 2020 fast-approaching, the implementation of new best practices and technology will solidify the UAE’s position as a leader in security.” Artificial intelligence and machine learning Andreas Rex, Show Director at Messe Frankfurt Middle East, which organises Intersec, added: “No sector is exempt from technological advancement. The emergence of automation, biometrics, artificial intelligence and machine learning is transforming the face of the security sector and helping to address growing concerns surrounding unmanned aerial, cyber and identity fraud risks. As security risks become more complex, so too must the solutions designed to combat them.” As Intersec 2020 welcomed the global security industry to Dubai, the bullish security sector growth forecast was issued by Business France, the French government organization charged with fostering French exports and promoting inward investment into the country. France, one of 15 international country pavilions at the three-day show at Dubai World Trade Center, is debuting the most advanced technology emerging across seven broad product sectors: commercial security, smart home, cybersecurity, fire and rescue, safety and health, homeland security and policing, as well as perimeter and physical security. Access control systems The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO “The Middle East region represents a particularly attractive market for the safety and security sector, which is expected to grow around 10% per year to 2022,” said Frederic Szabo, Managing Director, Business France Middle East, which is hosting 15 French companies at Intersec – 11 of which specialize in fire and rescue. “Increasing the capabilities of infrastructure, securing power plants and oil complexes, protecting sites and people for major events to come are all excellent reasons for French experts to extend their presence in the region,” added Szabo. The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO, a manufacturer of turnstiles, gates and access control systems, which is leveraging Intersec to launch EasyGate Superb – the world’s slimmest, fully-equipped speed gate for access control. Next-generation security risks COMINFO’s regional launch of EasyGate Superb is one in hundreds of major transformative technology breakthroughs at the fair, where the scale of next-generation security risks and the intelligent technology required to prevent and defend against security threats are being explored by local, regional and global industry leaders at Intersec’s comprehensive conference program. The four-pronged program, which includes the Intersec Arena, the Future Security Summit and Intersec Fire Conference, and the Security Industry Regulatory Agency (SIRA) forum, has drawn experts from more than 50 countries to Dubai. During a keynote address at the Intersec Arena on Sunday, Eng. Khalid Al Hammadi, Chairman of the Security Professionals Association (SPA), the first association for security professionals in the Middle East, announced the launch of SPA for SIRA, the Dubai agency tasked with ensuring the highest standards of security and safety in the emirate. AI and machine learning applications The event showcases the latest innovations and technologies in one of the most important years for the UAE SPA is a platform that allows security professionals to share and enhance their knowledge of industry best practices. “The industry is advancing towards technologies such as AI and machine learning applications, which will be used as part of the security protocols of Expo 2020,” said Eng Al Hammadi. “This is sure to create an array of job opportunities for individuals within the security sector, and SPA for SIRA will be there to act as a platform that bridges the gap between security professionals and regulators, as well as fostering a platform for knowledge exchange and development.” “Participating in Intersec enables our members to interact with a global network of security experts and learn about the latest security applications and trends within the industry. This event showcases the latest cutting-edge innovations and technologies in one of the most important years for the UAE, which will support the safe and secure logistics of Expo 2020 Dubai,” noted Al Hammadi. Digital and physical security At the conference, representatives from 35 governments, trade associations and non-profit institutions spanning the hydrocarbon, banking and finance, municipality, police, customs and healthcare sectors in the Middle East, Europe and the USA will map out the future security agenda over coming days. Digital security challenges, AI implementation, biometric innovations security loopholes in business ecosystems and the integration of digital and physical security to address critical threats are all key topics under the microscope. Held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, Intersec is supported by Dubai Police, Dubai Police Academy, Dubai Civil Defense, SIRA and Dubai Municipality. Intersec is a trade exhibition and conference open to trade professionals only. The show is open from 10am – 6pm on 20 and 21 January and is held in Halls 2-8, Trade Center Arena and Sheikh Saeed Halls 1-3 at Dubai World Trade Center.