Discover The Full Power Of Intellex® With American Dynamics® Intellex Software Management Suite
Discover The Full Power Of Intellex® With American Dynamics® Intellex Software Management Suite

When you choose an Intellex Digital Video Management System, you'll immediately realize the amazing efficiency that it brings to your security operation. Intellex is the only digital video management system on the market with a single remote management software program that works with every Intellex platform and allows you to centrally manage unlimited Intellex systems over a computer network.  With Network Client, our remote management software, you can be virtually everywhere at the same time and never miss an alarm or event.Our Intellex software management enabling tools allow you to:Network ClientControl every Intellex on your network, no matter how far-flung or decentralized the operation. Simply log in and access a menu just as if you were sitting in front of an Intellex.  You can view live video from up to any 64 cameras simultaneously, send and receive alarm notifications, and much more.  Now, it's easier than ever with our exciting new CCTV keyboard option that gives you the functionality of a virtual matrixArchive ManagerManage and organize stored video and audio Policy ManagerProvides security administration, required by an I.T Manager, for a network of Intellex units and remote workstationsBrowser ClientView live Intellex video through a web browserOf course, video technology isn't static.  That's why we never stop working to develop and enhance these tools, offering free downloadable upgrades on our website to keep you at the forefront of innovation.

Add to Compare

Video Surveillance software - Expert commentary

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Physical Security And The Cloud: Why One Can’t Work Without The Other
Physical Security And The Cloud: Why One Can’t Work Without The Other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.

Making School Safety A Priority With Smart Technology
Making School Safety A Priority With Smart Technology

With pupils in the UK set to go back to school on 8 March, there are a number of safety measures schools need to implement to ensure the health and wellness of the staff, students, and school communities.  The first lockdown and closure of schools brought on by the coronavirus pandemic fired a “warning shot” for education facilities managers, forcing head-teachers to re-examine school safety standards. Now that a third lockdown is here and schools have been shut down for a second time, anyone behind the curve with the benefits of smart technology should get on board now before children return to the school environment. And with the ever-changing variants of the COVID-19 virus, schools can’t afford to be “late to class” when it comes to health and safety. Preventing the spread of disease Some schools in the US have been using smart technologies for a while to measure utility consumption and efficiency, streamline maintenance and enhance general school safety. These technologies are playing a significant role in keeping school buildings healthy and preventing the spread of disease. Let’s take a look at how smart technology can help schools to become safer, as well as more energy-efficient and cost-effective.   Thermal detection cameras  Smart cameras placed at entry points of a school can remove the manual task of temperature testing Smart cameras placed at entry points of a school can remove the manual task of temperature testing. These cameras provide medically-accurate, real-time temperatures of individuals in real-time. If a high temperature is detected, the software sends an instant alert to the relevant party. It can also be set to deny access to those with high temperatures or to people not wearing masks.  Safer water  As the coronavirus continues to sweep through the world’s population, healthcare providers should also be on heightened alert for Legionnaires’ disease, another potential cause of pneumonia with similar symptoms. Legionella is a potentially deadly bacteria that can infect a school’s water supply and cause an outbreak of Legionnaire’s disease. It’s a school's duty of care to prevent Legionella infection by monitoring the risk of the bacteria proliferating.  Particularly as schools reopen and previously stagnant plumbing and cooling systems return to use, additional Legionella cases could rear their ugly head to emergency departments in the coming months. Traces of Legionella were recently found at a Worcestershire school. The school was forced to remain shut while treatment and testing took place. Automated flushing and temperature testing Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters The Health and Safety Executive advises, “If your building was closed or has reduced occupancy during the coronavirus (COVID-19) outbreak, water system stagnation can occur due to lack of use, increasing the risks of Legionnaires’ disease… If the water system is still used regularly, maintain the appropriate measures to prevent legionella growth.” Typically, managing the risk of Legionella includes running all outlets for two minutes, taking and recording the temperature of the water to ensure that it’s not conducive to Legionella growth. This is a time-consuming process, which is why schools are looking for automated water temperature monitoring systems. This smart system with automated flushing and temperature testing reports and records water temperature data in real-time. Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters.  Cleaner air  Advisers say that improving air filtration and ventilation in schools can help mitigate the potential airborne transmission of COVID-19. Strategies include: Increasing outdoor air ventilation Filtering indoor air Using portable air cleaners with HEPA filters  Smart building technologies such as advanced HVAC controls can help facilities managers promote cleaner air with less hassle. For example, smart HVAC systems use sensors to remotely monitor and control variables such as:  Humidity Temperature Indoor air quality The level of carbon dioxide and other pollutants The technology is also energy-efficient and cost-effective.  While these solutions may be key to the reopening of schools in the era of COVID-19, they also bring long-term benefits. Although COVID-19 may have accelerated the adoption of smart technology, many of these solutions are focused on health, wellness, and security in general; which have been needed in school systems for a long time.

Latest American Dynamics, Tyco International news

Johnson Controls Releases The Newest Version Of The Tyco Kantech EntraPass Security Management Software
Johnson Controls Releases The Newest Version Of The Tyco Kantech EntraPass Security Management Software

Johnson Controls, the pioneer in smart, healthy, and sustainable buildings, and architect of the OpenBlue digital connected platforms, releases the newest version of the Tyco Kantech EntraPass security management software. EntraPass version 8.30 features additional support for Tyco DSC PowerSeries intrusion alarm panels, including a fully functional virtual keypad, enhanced support for EntraPass web macOS functionality, cybersecurity updates, and other optimizations for a more streamlined user experience. Intrusion alarm panels For a more seamless combination of access control and intrusion, additional support for the Tyco DSC PowerSeries alarm panel family includes a fully functional virtual keypad, with the same functions, navigations, and emergency keys as the physical DSC intrusion alarm panels. This enables system operators to perform intrusion functions remotely This enables system operators to perform intrusion functions remotely from an EntraPass workstation, such as the arming/disarming of intrusion panels or acknowledging/canceling alarms without needing to be physically present at the keypad’s location. Printing cardholder badges Users who prefer mobile access to their EntraPass software can now view real-time or recorded video from Tyco Exacq and Tyco American Dynamics VideoEdge NVRs as part of new features in EntraPass web macOS v1.10. Other enhancements include creating, customizing, and exporting reports to PDF, the ability to take users’ pictures and print cardholder badges on site and in real-time. As part of ongoing efforts to improve cybersecurity, the following enhancements were added to EntraPass software: EntraPass workstation reports are now stored in the Windows user’s document folder. Updated operator roles and password requirements. Microsoft certificate validation that the EntraPass application has not been tampered with.

Johnson Controls Announces Mask Detection, Intelligent Person Search Features In Upgraded Victor/ VideoEdge 5.6 Solution
Johnson Controls Announces Mask Detection, Intelligent Person Search Features In Upgraded Victor/ VideoEdge 5.6 Solution

Johnson Controls, the globally renowned provider of smart security and sustainable building solutions, has announced the introduction of the latest generation of the Tyco American Dynamics victor/ VideoEdge security solution, which offers powerful features, such as Intelligent Person Search, Area Occupancy, new Event Management hub, 64-bit client, and NVR Network Interface Card bonding for increased bandwidth. victor/ VideoEdge solution The Tyco American Dynamics victor/ VideoEdge security solution features new victor/ VideoEdge AI to give security operations and personnel an advantage over potential threats with shortened response times and more accurate intelligent search capabilities. These advanced AI capabilities equip customers with a comprehensive, intelligent security solution for high accuracy, and far greater power, giving their businesses a superior advantage against any potential threat. Powerful AI and analytics Powerful AI and analytics are now combined and integrated with victor/ VideoEdge Powerful AI and analytics are now combined and integrated with victor/ VideoEdge to strengthen operational efficiency and effectiveness. The security solution detects suspicious objects and abnormal behavior effectively to identify trends that help mitigate threats, and pinpoint exact location of alarms on maps, so as to arm security teams with life-saving details. With powerful, automated and forensic search capabilities, powered by Tyco AI, victor/ VideoEdge users are able to save time when precious minutes matter. Cyber Solutions Product Security Program standards compliance All of the company’s products are analyzed, tested and are required to meet or exceed the rigorous standards of the Johnson Controls Cyber Solutions Product Security Program. This holistic approach is aimed at providing peace of mind to customers. Johnson Controls’ security mindset begins at initial design concept and is supported through deployment, including a rapid incident response to meet the comprehensive and evolving cyber security environments.

Johnson Controls Releases Tyco HD Video Encoder For Seamless Analog And IP Integration
Johnson Controls Releases Tyco HD Video Encoder For Seamless Analog And IP Integration

Johnson Controls introduces the Tyco HD Encoder, an ideal solution that allows high definition (HD) and standard definition (SD) analog cameras to function within an evolving IP infrastructure. The product is supported by both exacqVision, American Dynamics and VideoEdge. IP video surveillance Available in one-and four-channel options, the Tyco HD Encoder allows users in networked environments to retain HD and SD cameras while adding IP cameras over time, leveraging the benefits of IP while utilizing their existing analog infrastructure. Encoder hardware adapts analog video to be sent over IP networks, helping CCTV systems upgrade to a modern IP video surveillance organization. The HD Encoder is ready for deployment out-of-the-box and is Power over Ethernet enabled for minimal cabling by running power and data through the same CAT5/6 cable. The encoder also includes important features like HDMI out, H.264 compression for cameras up to 2MP, multi-streaming and support for AHD, CVI and TVI analog protocols. Fully integrated video system Tyco provides network video recorders and video management systems from American Dynamics and Exacq, offering the foundation for a fully integrated video system. Purchasing each aspect of the solution from the same vendor reduces potential product lifetime issues while streamlining setup and support.

Related white papers

Delivering a Smart, Secure and Healthy Workplace with Cloud

Cloud Video and Smart Cities

Security Investments Retailers Should Consider For Their 2021 Budget