Siqura Video Surveillance software (10)
DIVA, an IP-based video management solution, adds intelligence and comfort to video surveillance and monitoring. Next to the full-featured live-viewing and playback user-interface, DIVA offers built-in intelligence for facial recognition and license plate recognition for security applications. In combination with Siqura’s IP cameras and codecs, DIVA offers the perfect solution for a wide range of situations, including perimeter security, homeland security, theft/vandalism prevention, and intrusion detection. Adapting to the application DIVA is one of the most flexible VMS solutions available. Whether it’s a small operation of ten streams or a complex network of well over 1000 cameras, DIVA successfully manages the network and applies analytics algorithms to detect and recognize faces and license plates. Since operators often require different features and functionalities, it is possible to configure the DIVA user-interface and video wall layout to fit the needs of each specific user profile. This ensures that those using DIVA have an accessible and user-friendly application at their finger-tips. Easy integration It is easy to integrate DIVA with third-party systems. Besides supporting a wide range of subsystems, including access control, data synchronization, intrusion, and building management, DIVA provides flexible XML data output to communicate its events to third-party applications. Furthermore, DIVA can integrate with a matrix switch to provide a hybrid solution. This ultimately facilitates the migration from existing analog infrastructure to an IP installation. Guaranteed availability DIVA’s failover server ensures the reliability and availability of the entire system It monitors a specified list of servers. If no response is received from one of the servers, the failover server takes on the settings of that server and starts to function as that server. Several failover servers can be defined to monitor different groups of active servers. Additionally, DIVA monitors the position and image quality of connected cameras to verify the effectiveness of the applied analytics. This ultimately provides users with a truly complete management system that guarantees the dependability of the surveillance solution.Add to Compare
A complete video surveillance system at a glance TKH Security Solutions' DIVA is an IP-based video management system equipped with an array of video analytics for detecting and classifying objects, including faces and license plates. Since operators often require different features and functionalities, it is possible to configure the DIVA user-interface and video wall layout to fit the needs of each specific user profile. Moreover, DIVA’s failover server monitors a specified list of servers. If no response is received from one of the servers, the failover server takes on the settings of that server and starts to function as that server. Several failover servers can be defined to monitor different groups of active servers, ultimately guaranteeing the reliability and availability of the entire system. Only one camera streams Ethernet signals directly over coax, fiber, or Cat 5 The recently released Siqura BC620WDR from TKH Security Solutions is the only camera on the market that offers an integrated adaptor for Ethernet over coax, in addition to interface options for streaming IP directly over fiber optic or Cat 5 cables. Additionally, the BC620WDR contains the Seawolf DPS image sensor from Pixim, which processes each pixel individually. This ensures extremely clear images in outdoor applications and difficult lighting situations, where, for example, sun reflections might obstruct monitoring and analytics. Based on an advanced new platform that puts entire video analytics and multistream encoding systems in stand-alone devices at the edge of the network, the BC620WDR innovatively meets the industry-wide demand to upgrade legacy systems. At the ISC West 2012 trade show, the BC620WDR received the New Product Showcase Judges’ Choice Award, a highly coveted product recognition award from the Security Industry Association. SIA NPS selected the Siqura BC620WDR for this reputable award due to its unique approach to a security solution. “The Siqura BC620WDR from TKH Security Solutions is a great example of bringing innovation to the marketplace,” said SIA NPS Chair Jennifer Martin. Centralised security management solution An iProtect™ Security Management System from TKH Security Solutions offers a highly reliable and fully integrated Web-based security management system for access control, camera surveillance, intrusion detection, parking management, intercom communication, and time and attendance registration. Users can manage their iProtect™ system from anywhere in the world using a personalized user interface via a standard Web browser. Using the Secure Socket Layer (SSL) protocol, iProtect™ encrypts the data traffic between the system hub and the workstations, thereby ensuring the safety of the system and all its material. Security management based on market standards TKH Security Solutions has also introduced Fore!, a fully integrated security management system for access control, camera surveillance, and intercom communication. Fore! is based on the ONVIF, Wiegand, and SIP standards, thereby making it possible to automatically detect devices on the network. Fore! also allows users to access the client application via mobile devices, such as a tablet, PC, or smartphone. Fore! is a software-only solution, ensuring that it is easy to install, configure, and use. Customized access control Sirius offers an access control solution that ensures reliable and scalable systems. In addition to automatic visitor registration, attendance reports, and verifiable entrance badges, Sirius includes features such as interactive maps and timed anti-pass-back security cards. The Sirius access control solution grants access to a maximum of 100,000 people using an unlimited number of readers. At IFSEC, TKH Security Solutions introduced a new product line of innovative card readers and a full range of mechanical access solutions. The new card readers are NFC compatible, consume very little energy, and include a unique power management functionality. Vertical-specific security software With legacy alarm and communication systems in place all over the world, there is a high demand for customized software that can centralize a security system as well as facilitate system upgrades. TKH Security Solutions offers FlinQ, a software interface program that is tailored to specific market verticals, including critical infrastructure and financial applications. FlinQ provides a scalable and modular solution based on open standards, allowing users to select only the system components they need and to easily integrate their software package into existing networks. Besides multi-touch and multi-lingual options for easy interaction with the user interface, FlinQ also supports remote access via mobile devices, so users can manage their system anywhere, anytime. Ultimately, FlinQ builds bridges between users and their diverse networks comprising access control, video surveillance, intrusion detection, and intercom communication equipment and puts security systems on the right track to start integrating and utilizing the latest IP security technologies.Add to Compare
Operator Office™ is the front-end interface for Optelecom-NKF's growing suite of integrated IP video products for networked security applications. This new software application enables centralised monitoring and PTZ control of CCTV/Surveillance cameras from multiple sites.Intuitive graphical user interfaceSupports MPEG-2 and MPEG-4Recording and snapshot facilitiesEmulated PTZ supportOperator Office™ allows simultaneous viewing of 1 to 16 high-quality video images on one or two screens. It features multiple video streams, two-way CD quality audio for PA systems or intercom, alarm handling, and PTZ control. In addition, it supports a virtually unlimited number of Optelecom-NKF video codecs. The intuitive user interface is modeled after the familiar Windows look and feel, including drag & drop camera selection and mouse-controlled PTZ. To further enhance the user experience, the software supports map-based camera selection with individual maps for each level of the tree structure. A single mouse click activates recording of live images, storing the video stream including pre-alarm footage. Recorded streams can be replayed locally or exported for viewing in standard PC video player applications. Operator office™ PC viewing client software offers the operator a powerful efficient tool for networked security applications, to aid in safety, security and remote monitoring.Software is an essential component of Siqura™, a new platform for building integrated networked surveillance systems. Siqura™ was introduced at IFSEC 2006.Add to Compare
Browse Video Surveillance software
Video Surveillance software products updated recently
The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol. This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
With pupils in the UK set to go back to school on 8 March, there are a number of safety measures schools need to implement to ensure the health and wellness of the staff, students, and school communities. The first lockdown and closure of schools brought on by the coronavirus pandemic fired a “warning shot” for education facilities managers, forcing head-teachers to re-examine school safety standards. Now that a third lockdown is here and schools have been shut down for a second time, anyone behind the curve with the benefits of smart technology should get on board now before children return to the school environment. And with the ever-changing variants of the COVID-19 virus, schools can’t afford to be “late to class” when it comes to health and safety. Preventing the spread of disease Some schools in the US have been using smart technologies for a while to measure utility consumption and efficiency, streamline maintenance and enhance general school safety. These technologies are playing a significant role in keeping school buildings healthy and preventing the spread of disease. Let’s take a look at how smart technology can help schools to become safer, as well as more energy-efficient and cost-effective. Thermal detection cameras Smart cameras placed at entry points of a school can remove the manual task of temperature testing Smart cameras placed at entry points of a school can remove the manual task of temperature testing. These cameras provide medically-accurate, real-time temperatures of individuals in real-time. If a high temperature is detected, the software sends an instant alert to the relevant party. It can also be set to deny access to those with high temperatures or to people not wearing masks. Safer water As the coronavirus continues to sweep through the world’s population, healthcare providers should also be on heightened alert for Legionnaires’ disease, another potential cause of pneumonia with similar symptoms. Legionella is a potentially deadly bacteria that can infect a school’s water supply and cause an outbreak of Legionnaire’s disease. It’s a school's duty of care to prevent Legionella infection by monitoring the risk of the bacteria proliferating. Particularly as schools reopen and previously stagnant plumbing and cooling systems return to use, additional Legionella cases could rear their ugly head to emergency departments in the coming months. Traces of Legionella were recently found at a Worcestershire school. The school was forced to remain shut while treatment and testing took place. Automated flushing and temperature testing Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters The Health and Safety Executive advises, “If your building was closed or has reduced occupancy during the coronavirus (COVID-19) outbreak, water system stagnation can occur due to lack of use, increasing the risks of Legionnaires’ disease… If the water system is still used regularly, maintain the appropriate measures to prevent legionella growth.” Typically, managing the risk of Legionella includes running all outlets for two minutes, taking and recording the temperature of the water to ensure that it’s not conducive to Legionella growth. This is a time-consuming process, which is why schools are looking for automated water temperature monitoring systems. This smart system with automated flushing and temperature testing reports and records water temperature data in real-time. Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters. Cleaner air Advisers say that improving air filtration and ventilation in schools can help mitigate the potential airborne transmission of COVID-19. Strategies include: Increasing outdoor air ventilation Filtering indoor air Using portable air cleaners with HEPA filters Smart building technologies such as advanced HVAC controls can help facilities managers promote cleaner air with less hassle. For example, smart HVAC systems use sensors to remotely monitor and control variables such as: Humidity Temperature Indoor air quality The level of carbon dioxide and other pollutants The technology is also energy-efficient and cost-effective. While these solutions may be key to the reopening of schools in the era of COVID-19, they also bring long-term benefits. Although COVID-19 may have accelerated the adoption of smart technology, many of these solutions are focused on health, wellness, and security in general; which have been needed in school systems for a long time.
All Siqura activities will continue under the banner of TKH Security. These renowned companies in video security solutions were both already members of TKH Group NV. The Siqura video security solutions are often sold in combination with the developed security solutions of TKH Security and this complete solution is highly appreciated by their customers worldwide. Therefore, the time has come to group all activities in TKH Security. “By combining all activities, we give our customers more transparency and clarity in what we can offer them. Furthermore, we increase our services. For example, the contact point for all questions and orders, invoices, documentation, support tickets, etc. will be centralized. This will be much more efficient for our customers as well as our employees”, says Timme Grijpink, Managing Director of TKH Security. Site management solutions TKH Security specializes in the development of electronic Security & Site Management Systems The Siqura brand will be retained for the wide product range of Siqura, such as security cameras, mobility cameras, marine cameras, explosion-proof and thermal cameras, IP video encoders, ethernet switches and fiber optic transmitters. This product range is complementary to the TKH Security product range, encompassing security management, video management, parking facility management and asset & site management solutions. With this aggregation of activities TKH Security has offices worldwide in Amsterdam, Gouda and Zoetermeer (the Netherlands), Madrid (Spain), Dubai (UAE), Singapore and Frederick (USA). TKH Security specializes in the development of electronic Security & Site Management Systems. Open architecture integration With over 25 years of experience and by listening to customer needs, the company offers complete innovative solutions for Security Management, Access Control, Video Management, Intrusion Detection, Intercom, Personal Surveillance, Asset & Site Management and Parking Facility Management. The company is always looking for innovative solutions for the market with a focus on creative, flexible and open architecture integration. TKH Security has a strong position in the Benelux and multiple offices all over the world. TKH Security is a member of TKH Group N.V.
The road network is under increasing pressure due to the sheer weight of traffic, and its bridges and water locks are no exception. In view of the importance of free-flowing traffic and the safety of such structures, they undergo continuous modernization. One such modernization is CCTV: by incorporating video surveillance into a security system, end-users can monitor and anticipate what’s happening at a certain location in real-time. This increases the efficiency and safety of such objects. Video management system Operators are continually fed the latest information through the video management system, allowing them to effectively anticipate any situation that may arise. This makes it possible to guarantee an optimum flow of vehicles and ships and to better respond to changing traffic situations in critical environments. TKH Security is specialized in video management systems in combination with Siqura cameras, thereby meeting the stricter laws and regulations governing the wet infrastructure sector. Motion detection Robin de Neve, International Sales Manager: “At TKH Security, we have been involved in wet infrastructure for many years and therefore know like no other how, in conjunction with installation engineers, to provide support to end users in the challenges they face in the sector. Thanks to the latest compression techniques and dual streaming, motion detection has become very efficient in terms of storage. Among the great advantages to operators is the fact that the system is very user friendly, it records only what is needed and it is exceedingly reliable thanks to failover functionality.” Easy-to-use high tech De Neve goes on to say: “Custom configurations can be made for individual operators, with panels to review images, for instance, control elements for third-party systems, HTML browsers and maps. The system has an open architecture and is API and ONVIF compatible, making installation and integration very easy. Using a powerful macro engine, customers can determine how the system responds given specific situations. Our video surveillance solution is scalable from a few to a few thousand cameras. Thermal cameras detect people on structures in all weather conditions, including rain, fog and low sun. In such cases, a signal is sent automatically to the control room so that operators can immediately respond if necessary.” Cameras with existing cabling Many structures such as bridges and water locks currently still use analog solutions, and replacing existing cabling to enable an IP solution is often considered to be too expensive. TKH Security has special hybrid cameras that feature both analog BNC connectors and SFP slots in addition to a regular network connection, making it possible to link them to several SFP modules: the Siqura 920 series. It is therefore not necessary to replace existing cabling, which considerably reduces costs. The hybrid cameras make it possible to use old-fashioned coaxial/analog networks and still be able to migrate to IP cameras.
Siqura and TKH Security realized a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialized departments, a 32-bed emergency ward, a 3-story rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfill the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”
Related white papers
Delivering a Smart, Secure and Healthy Workplace with Cloud
Cloud Video and Smart Cities
Security Investments Retailers Should Consider For Their 2021 Budget
Automatic Vehicle IdentificationDownload
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
Southern Fire & Security And Acctive Systems Enhance Security Systems Design With Axis Communications’ AXIS Site Designer
- Southern Fire & Security And Acctive Systems Enhance Security Systems Design With Axis Communications’ AXIS Site Designer
- The Gaylord Opryland Resort And Convention Center Upgrades Their Video Surveillance System With Cameras From Hanwha Techwin
- Iceland’s Reiknistofa Bankanna (RB) IT Service Provider Overhauls Its Security Infrastructure With Genetec Security Center
- Digital Barriers’ Real-Time Surveillance And AI-Based Edge Analytics Solutions Help Counter The Rise In Rural Crime In Wales