Adjusting To Any Surveillance Application
Adjusting To Any Surveillance Application

DIVA, an IP-based video management solution, adds intelligence and comfort to video surveillance and monitoring. Next to the full-featured live-viewing and playback user-interface, DIVA offers built-in intelligence for facial recognition and license plate recognition for security applications. In combination with Siqura’s IP cameras and codecs, DIVA offers the perfect solution for a wide range of situations, including perimeter security, homeland security, theft/vandalism prevention, and intrusion detection. Adapting to the application DIVA is one of the most flexible VMS solutions available. Whether it’s a small operation of ten streams or a complex network of well over 1000 cameras, DIVA successfully manages the network and applies analytics algorithms to detect and recognize faces and license plates. Since operators often require different features and functionalities, it is possible to configure the DIVA user-interface and video wall layout to fit the needs of each specific user profile. This ensures that those using DIVA have an accessible and user-friendly application at their finger-tips. Easy integration It is easy to integrate DIVA with third-party systems. Besides supporting a wide range of subsystems, including access control, data synchronization, intrusion, and building management, DIVA provides flexible XML data output to communicate its events to third-party applications. Furthermore, DIVA can integrate with a matrix switch to provide a hybrid solution. This ultimately facilitates the migration from existing analog infrastructure to an IP installation. Guaranteed availability DIVA’s failover server ensures the reliability and availability of the entire system It monitors a specified list of servers. If no response is received from one of the servers, the failover server takes on the settings of that server and starts to function as that server. Several failover servers can be defined to monitor different groups of active servers. Additionally, DIVA monitors the position and image quality of connected cameras to verify the effectiveness of the applied analytics. This ultimately provides users with a truly complete management system that guarantees the dependability of the surveillance solution.

Add to Compare
TKH Security Solutions Complete Security Systems
TKH Security Solutions Complete Security Systems

A complete video surveillance system at a glance TKH Security Solutions' DIVA is an IP-based video management system equipped with an array of video analytics for detecting and classifying objects, including faces and license plates. Since operators often require different features and functionalities, it is possible to configure the DIVA user-interface and video wall layout to fit the needs of each specific user profile. Moreover, DIVA’s failover server monitors a specified list of servers. If no response is received from one of the servers, the failover server takes on the settings of that server and starts to function as that server. Several failover servers can be defined to monitor different groups of active servers, ultimately guaranteeing the reliability and availability of the entire system. Only one camera streams Ethernet signals directly over coax, fiber, or Cat 5 The recently released Siqura BC620WDR from TKH Security Solutions is the only camera on the market that offers an integrated adaptor for Ethernet over coax, in addition to interface options for streaming IP directly over fiber optic or Cat 5 cables. Additionally, the BC620WDR contains the Seawolf DPS image sensor from Pixim, which processes each pixel individually. This ensures extremely clear images in outdoor applications and difficult lighting situations, where, for example, sun reflections might obstruct monitoring and analytics. Based on an advanced new platform that puts entire video analytics and multistream encoding systems in stand-alone devices at the edge of the network, the BC620WDR innovatively meets the industry-wide demand to upgrade legacy systems. At the ISC West 2012 trade show, the BC620WDR received the New Product Showcase Judges’ Choice Award, a highly coveted product recognition award from the Security Industry Association. SIA NPS selected the Siqura BC620WDR for this reputable award due to its unique approach to a security solution. “The Siqura BC620WDR from TKH Security Solutions is a great example of bringing innovation to the marketplace,” said SIA NPS Chair Jennifer Martin. Centralised security management solution An iProtect™ Security Management System from TKH Security Solutions offers a highly reliable and fully integrated Web-based security management system for access control, camera surveillance, intrusion detection, parking management, intercom communication, and time and attendance registration. Users can manage their iProtect™ system from anywhere in the world using a personalized user interface via a standard Web browser. Using the Secure Socket Layer (SSL) protocol, iProtect™ encrypts the data traffic between the system hub and the workstations, thereby ensuring the safety of the system and all its material. Security management based on market standards TKH Security Solutions has also introduced Fore!, a fully integrated security management system for access control, camera surveillance, and intercom communication. Fore! is based on the ONVIF, Wiegand, and SIP standards, thereby making it possible to automatically detect devices on the network. Fore! also allows users to access the client application via mobile devices, such as a tablet, PC, or smartphone. Fore! is a software-only solution, ensuring that it is easy to install, configure, and use. Customized access control Sirius offers an access control solution that ensures reliable and scalable systems. In addition to automatic visitor registration, attendance reports, and verifiable entrance badges, Sirius includes features such as interactive maps and timed anti-pass-back security cards. The Sirius access control solution grants access to a maximum of 100,000 people using an unlimited number of readers. At IFSEC, TKH Security Solutions introduced a new product line of innovative card readers and a full range of mechanical access solutions. The new card readers are NFC compatible, consume very little energy, and include a unique power management functionality. Vertical-specific security software With legacy alarm and communication systems in place all over the world, there is a high demand for customized software that can centralize a security system as well as facilitate system upgrades. TKH Security Solutions offers FlinQ, a software interface program that is tailored to specific market verticals, including critical infrastructure and financial applications. FlinQ provides a scalable and modular solution based on open standards, allowing users to select only the system components they need and to easily integrate their software package into existing networks. Besides multi-touch and multi-lingual options for easy interaction with the user interface, FlinQ also supports remote access via mobile devices, so users can manage their system anywhere, anytime. Ultimately, FlinQ builds bridges between users and their diverse networks comprising access control, video surveillance, intrusion detection, and intercom communication equipment and puts security systems on the right track to start integrating and utilizing the latest IP security technologies.

Add to Compare
Optelecom-NKF Launched Operator Office™ PC Viewing Client Software
Optelecom-NKF Launched Operator Office™ PC Viewing Client Software

Operator Office™ is the front-end interface for Optelecom-NKF's growing suite of integrated IP video products for networked security applications.  This new software application enables centralised monitoring and PTZ control of CCTV/Surveillance cameras from multiple sites.Intuitive graphical user interfaceSupports MPEG-2 and MPEG-4Recording and snapshot facilitiesEmulated PTZ supportOperator Office™ allows simultaneous viewing of 1 to 16 high-quality video images on one or two screens.  It features multiple video streams, two-way CD quality audio for PA systems or intercom, alarm handling, and PTZ control.  In addition, it supports a virtually unlimited number of Optelecom-NKF video codecs. The intuitive user interface is modeled after the familiar Windows look and feel, including drag & drop camera selection and mouse-controlled PTZ.  To further enhance the user experience, the software supports map-based camera selection with individual maps for each level of the tree structure.  A single mouse click activates recording of live images, storing the video stream including pre-alarm footage.  Recorded streams can be replayed locally or exported for viewing in standard PC video player applications. Operator office™ PC viewing client software offers the operator a powerful efficient tool for networked security applications, to aid in safety, security and remote monitoring.Software is an essential component of Siqura™, a new platform for building integrated networked surveillance systems. Siqura™ was introduced at IFSEC 2006.

Add to Compare

Video Surveillance software - Expert commentary

Fighting Illicit Trade With Artificial Intelligence
Fighting Illicit Trade With Artificial Intelligence

AI has opened doors to many transformation opportunities and increasingly minimised many risks  -- personal and economic -- that are alarming today. And illicit trade is one of those pains AI can offer a promising solution against. Illicit trade is a serious threat and problem that affects governments and societies on every level. While governments lose financial funds in tax revenues, thriving businesses are losing potential customers, and customers are getting tricked into purchasing counterfeit, low-quality products. Transnational organized crime generates revenue of $2.2 trillion through transnational criminal organizations, complicit corrupt facilitators, and other threat areas. The list of criminal activities is long and involves such horrific crimes as trafficking of narcotics, opioids, arms, humans, fake medicines and other counterfeit and pirated goods; illegal tobacco and alcohol; illegally-harvested timber, wildlife, and fish; pillaged oil, diamonds, gold, and other natural resources and precious minerals; stolen antiquities; and other contraband or valuable items sold across streets, social media, online marketplaces, and the dark web. In short, illicit trade is a contributing cause to large-scale insecurity and instability across markets. AI-driven technologies Here is where revolutionary AI-driven technologies come in, with their capability to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. There are a few ways that AI can support the ongoing fight against illicit trade on a global scale in a tangible way. Transnational organized crime generates revenue of $2.2 trillion For financial transactions at risk of fraud and money laundering, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents -- often billions of pages of documents -- in a short period of time. Among these documents widely in circulation, most have an unstructured and inconsistent format -- from invoices to insurance documentation -- are a complex system to tackle; in this whirlwind of pages, the likelihood of non-compliant and misrepresented figures to go by unnoticed. But this is also where AI can thrive as solutions become a necessity, enhancing humans’ capabilities of identifying fraud risks in the early stages. Relying on natural language processing, the technology can begin interpreting the text from the scanned and digitised documents in order to process trade information at high speed. In this context, AI-powered solutions are capable of comparing, contrasting document information and identify anomalies worth looking into further. By automating a large portion of the process, AI-driven technology allows the staff to focus on more pressing, high-involvement issues that require human judgement while saving time on the time-consuming manual work of analyzing documents by hand. Identifying covert interactions between criminals As criminal networks become increasingly intricate in their illegal operations, cutting-edge AI technology is crucial in the battle against it. In 2019, EU launched a project with the goal to deploy advanced AI technology and robots to identify smuggling across the borders of Portugal, Estonia, Italy, Greece, Bulgaria, Romania and Hungary.  With the help of AI, it will be possible to send drones and autonomous vehicles to the most dubious border areas in order to enforce border control and detect smugglers quickly and efficiently. Illicit trade triggers a chain reaction of negative impact across industries, governments and individuals The issues the EU is trying to address through the project include drug and weapon smuggling, as well as human trafficking. From tight border control tracking crossings to communication monitoring to identify covert interactions between criminals on both sides of the border, the project is one among many that will expand the scope of solutions to the illicit trade problems today. AI’s contribution is significant on many levels: from predicting crime and threats to safeguarding public health and safety (in face of human trafficking, counterfeit medicines, and toxic products), these are simply inklings of major shifts that AI technology promises for the future of the battle against illicit trade. So why is fighting illicit trade so crucial? Here are a few reasons why AI’s role in fighting this global issue is crucial. In a world where customers run the risk of being deceived and tricked into buying counterfeit products, companies who provide the original products suffer through the loss of revenue and market share. The same companies are also robbed of their intellectual property and proprietary data. Furthermore, people who are employed in these companies run the risk of losing their jobs as a result of revenue and market share loss. And finally, the last straw is the loss of brand integrity and reputation to the need to compete with low-quality, sometimes even dangerous counterfeit products. Just like a domino effect, illicit trade triggers a chain reaction of negative impact across industries, governments and individuals. And it’s time for AI to step in and stop it.

Edge Computing, AI and Thermal Imaging – The Future of Smart Security
Edge Computing, AI and Thermal Imaging – The Future of Smart Security

Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. With 4K-compliant cameras projected to make up over 24% of all network cameras shipped by 2023 – there is a fast-growing desire for reliable storage on-board security cameras. The question for businesses is: do they look to break up their existing smart video network, by separating and compartmentalising cameras to handle data requirements, or do they increase its storage capabilities? As some people begin to venture out and return to work following initial COVID-19 measures, we are also seeing demand for thermal imaging technology increase. New technology like this combined with more of these always-on systems being rolled out, means organizations will need to carefully consider their smart video strategy. Newer edge computing will play an important role in capturing, collecting, and analyzing data and there are some key trends you can expect to see as a result of this evolution. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. Edge computing and smart security As public cloud adoption grew, companies and organizations saw the platform as a centralized location for big data. However, recently there’s been opposition to that trend. Instead we are now seeing data processed at the edge, rather than in the cloud. There is one main reason for this change in preference: latency. Newer edge computing will play an important role in capturing, collecting, and analyzing data Latency is an important consideration when trying to carry out real-time pattern recognition. It’s very difficult for cameras to process data – 4K surveillance video recorded 24/7 – if it has to go back to a centralized data center hundreds of miles away. This data analysis needs to happen quickly in order to be timely and applicable to dynamic situations, such as public safety. By storing relevant data at the edge, AI inferencing can happen much faster. Doing so can lead to safer communities, more effective operations, and smarter infrastructure. UHD and storage AI-enabled applications and capabilities, such as pattern recognition, depend on high-definition resolutions such as 4K – also known as Ultra High Definition (UHD). This detailed data has a major impact on storage – both the capacity and speeds at which it needs to be written, and the network. Compared to HD, 4K video has much higher storage requirements and we even have 8K on the horizon. As we know, 4K video has four times the number of pixels as HD video. In addition, 4K compliant video supports 8, 10, and 12 bits per channel that translate to 24-, 30- or 36-bit color depth per pixel. A similar pattern holds for HD — more color using 24 bits or less color using 10 or 12 bits in color depth per pixel. Altogether, there is up to a 5.7x increase in bits generated by 4K vs. 1080 pixel video. Larger video files place new demands on data infrastructure for both video production and surveillance. Which means investing in data infrastructure becomes a key consideration when looking into smart security. Always-on connectivity Whether designing solutions that have limited connectivity or ultra-fast 5G capabilities, most smart security solutions need to operate 24/7, regardless of their environment. Yet, on occasion, the underlying hardware and software systems fail. In the event of this, it is important to establish a failover process to ensure continued operation or restore data after a failure, including everything from traffic control to sensors to camera feeds and more. Consider the example of a hospital with dozens or even over a hundred cameras connected to a centralized recorder via IP. If the Ethernet goes down, no video can be captured. Such an event could pose a serious threat to the safety and security of hospital patients and staff. For this reason, microSD cards are used in cameras to enable continuous recording. Software tools – powered by AI – can then “patch” missing data streams with the content captured on the card to ensure the video stream can be viewed chronologically with no content gaps. Thermal imaging Health and safety is the number one priority for all organizations as people return to work and public spaces. Some organizations are deploying thermal imaging to help screen individuals for symptoms as they return. Organizations that operate with warehouses, depots and assembly lines will traditionally have large amounts of cameras located outside of the entrance. With thermal imaging smart video in place, these cameras can now serve a dual purpose as a screening device. The thermal imaging technology is capable of detecting elevated body temperatures, with 10-25 workers being scanned in one shot, from one camera – making it an efficient and accurate process. This way, staff can use the information to help identify people who may need further screening, testing, and/or isolation before returning to work. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices While this may not increase data storage requirements, it can change your retention policies and practices. Smart security today is about utilising AI and edge computing, to deliver an always-on, high-resolution video provision that can help keep people safe 24/7. These trends increase the demands and importance of monitoring, which means requirements of the supporting data infrastructure improve to match that, including the ability to proactively manage the infrastructure to help ensure reliable operation. Companies need to make sure they have considered all the storage and policy challenges as part of their smart security strategy for the future.  

The New Marriage Between AI and Stadiums
The New Marriage Between AI and Stadiums

Stadiums around the world are still paralyzed from the effects of COVID-19. Fans and spectators in masses have been absent from stadiums since April and there doesn’t seem to be a concrete plan on how or when they’ll be able to return to near capacity. The NBA recently opted to form a bubble philosophy concept in Disney’s facilities, although it’s been a relative success, it’s also been a $200 million temporary solution. This then begs the question: How long can stadiums survive like this without spectator’s present? History tells us that stadiums, venues and sport recover from disasters, so what can stadiums do to speed up the process? This is the catalyst for AI to be integrated on mass level to stadiums around the world. AI is the answer AI’s role in getting fans and spectators back is huge, through capabilities such as: Social Distance Monitoring Crowd Scanning/Metrics Facial Recognition Fever Detection Track & Trace Providing Behavioural Analytics Technologies such as IREX.ai is now working alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. Stadiums around the world are still paralyzed from the effects of COVID-19 AI surveillance software such as IREX.ai when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. Crowd metrics Arming stadiums with AI-powered surveillance tools can detect crowd metrics such as “people counting” and “group statistics”. This ensures stadium personnel can monitor social distancing with precision, accuracy and immediately. Alerts can be set up throughout parts of the stadium to alert senior staff members when overcrowding can appear with real time videos, analytics and photos to their hand-held device, such as a smartphone. Fever detection Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures. What IREX.ai implements is an alert system, coupled with facial recognition of any individual(s) that read an elevated body temperature. This alert system then provides security and health officials with a photo of the individual with the elevated body temperature, meaning staff can react quicker to the situation prevent this individual from entry. Pandemic monitoring by facial recognition  Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures Through facial recognition, staff members will be able to locate individuals through simply uploading a photo. It has never been easier to find a person of interest. With masks becoming an everyday part of society, facial recognition has come under scrutiny regarding the accuracy when a mask is worn. Irex.ai still maintains a 96% accuracy with individuals wearing masks and can set up alerts for any individuals not wearing a mask. Another important aspect of facial recognition is finding persons of interest quickly through technology like IREX.ai’s “searchveillance”. The future is here. Designated staff can track a person from when they enter the stadium by simply uploading their photograph. An example of how this can assist stadium personnel is to help relocate lost children inside the stadium with their guardians/parents when they are separated. Another attribute would be any individuals banned from entering the stadium would trigger alerts once they appear under surveillance, a fantastic collaborative tool to use with Law Enforcement.    Return on investment With security solutions, one of the biggest issues with any security investment is a lack of an ROI. This is where AI security is breaking the mould. The ability to provide business analytics, consumer/fan behaviours, traffic patterns, etc, allows other departments within the organization to gain vital information that can assist with their strategies and practices. Stadium security will never be the same in a post-COVID world, so why will its practices stay the same? AI & Stadiums is no longer the future, it’s the 2020 solution.

Latest Siqura B.V. news

TKH Security Provides VMS With Siqura Cameras For The Wet Infrastructure Sector
TKH Security Provides VMS With Siqura Cameras For The Wet Infrastructure Sector

The road network is under increasing pressure due to the sheer weight of traffic, and its bridges and water locks are no exception. In view of the importance of free-flowing traffic and the safety of such structures, they undergo continuous modernization. One such modernization is CCTV: by incorporating video surveillance into a security system, end-users can monitor and anticipate what’s happening at a certain location in real-time. This increases the efficiency and safety of such objects. Video management system Operators are continually fed the latest information through the video management system, allowing them to effectively anticipate any situation that may arise. This makes it possible to guarantee an optimum flow of vehicles and ships and to better respond to changing traffic situations in critical environments. TKH Security is specialized in video management systems in combination with Siqura cameras, thereby meeting the stricter laws and regulations governing the wet infrastructure sector. Motion detection Robin de Neve, International Sales Manager: “At TKH Security, we have been involved in wet infrastructure for many years and therefore know like no other how, in conjunction with installation engineers, to provide support to end users in the challenges they face in the sector. Thanks to the latest compression techniques and dual streaming, motion detection has become very efficient in terms of storage. Among the great advantages to operators is the fact that the system is very user friendly, it records only what is needed and it is exceedingly reliable thanks to failover functionality.” Easy-to-use high tech De Neve goes on to say: “Custom configurations can be made for individual operators, with panels to review images, for instance, control elements for third-party systems, HTML browsers and maps. The system has an open architecture and is API and ONVIF compatible, making installation and integration very easy. Using a powerful macro engine, customers can determine how the system responds given specific situations. Our video surveillance solution is scalable from a few to a few thousand cameras. Thermal cameras detect people on structures in all weather conditions, including rain, fog and low sun. In such cases, a signal is sent automatically to the control room so that operators can immediately respond if necessary.” Cameras with existing cabling Many structures such as bridges and water locks currently still use analog solutions, and replacing existing cabling to enable an IP solution is often considered to be too expensive. TKH Security has special hybrid cameras that feature both analog BNC connectors and SFP slots in addition to a regular network connection, making it possible to link them to several SFP modules: the Siqura 920 series. It is therefore not necessary to replace existing cabling, which considerably reduces costs. The hybrid cameras make it possible to use old-fashioned coaxial/analog networks and still be able to migrate to IP cameras.

Siqura And TKH Security Integrates Surveillance And Access Control System For Sheikh Khalifa Central Hospital
Siqura And TKH Security Integrates Surveillance And Access Control System For Sheikh Khalifa Central Hospital

Siqura and TKH Security realized a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialized departments, a 32-bed emergency ward, a 3-story rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfill the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”

Milestone Systems Device Pack 10.1a Offers Firmware Support For Partners And Customers Using XProtect Video Solutions
Milestone Systems Device Pack 10.1a Offers Firmware Support For Partners And Customers Using XProtect Video Solutions

Milestone Systems, the number one global provider of open platform networked video management systems, has released Device Pack 10.1a for partners and customers using Milestone XProtect video solutions. The latest Device Pack offers new firmware support for partners Axis, FLIR Systems, Hanwha Techwin, Honeywell and MOBOTIX. New features include support for SRTP (Secure Real-time Transport Protocol), a feature that ensures that camera video streams are received via secure end-to-end encrypted transportation method only by authorized clients, for an increased number of Axis devices. Driver Command With Response Also, Device Pack 10.1a carries implemented support for ‘Driver Command with Response’ on all Axis drivers, as well as bugs-fixing of issues with connecting through HTTPS and appropriate handling of the speaker device of M1065-LW. Device Pack 10.1a has implemented support for thermal events for MOBOTIX M16 Series and new driver support for SonyGenXDevice Pack 10.1a has implemented support for thermal events for MOBOTIX M16 Series and new driver support for SonyGenX, including bug-fixing for failure on Edge retrieval for SNC-VB630 and Multicast Settings issues for Sony G7. The new Device Pack offers support for the ONVIF specification 18.06. This includes a number of major enhancements and minor clarifications for better interoperability among ONVIF conformant clients and devices. Support For The ONVIF Specification 18.06 With the release of Device Pack 10.0a in late 2018, Milestone Systems now supports new logic for Inputs/Outputs for Axis audio device driver. The device pack also has implemented support for variable bitrates for Bosch, support for additional analytic events for Vivotek, as well as for Siqura. The Device Pack 10.0a also supports ONVIF-based cameras for partners Mobotix and Arecont Vision, both of whom released their first ONVIF-based cameras in 2018.

Related white papers

Market Report: Cannabis At A Glance

6 Questions To Ask When Choosing A Security System

Optimize Your Business with Analytics and AI