Geutebruck Video Surveillance software(17)
The new Geutebruck security information management system, G-SIM is the ultimate reliable assistant for managing, filtering and processing the vast quantities of security information generated by medium to large networked video security systems. It provides the best in video event handling and intuitive user operation, even for very extensive and highly complex systems with dozens of sites, thousands of cameras and numerous other alarm generating systems. G-SIM uses graphical representations which are quick and easy to understand and interpret, combined with familiar drag-and-drop functionality which only allows actions relevant to the prevailing situation. High levels of customisation provide each operator in the network with the information he needs in his own individually preferred format, quickly, intuitively and reliably. G-SIM’s key features include central user management, easy administration and operation using site plan-based control elements as well as the central reporting of all relevant operating and system events. Its system architecture is freely scalable and designed to enable effortless interaction between users whether they are within the network or access it remotely. G-SIM allows you to spread the processes involved in managing more powerful systems efficiently across a variety of workstations and to pass work from one operator to another to delegate or escalate tasks. G-SIM provides a perfect fit solution for each application and each user and comprehensive support for your own security concept. You can configure functions such as the live and recorded image display; the site plan-based control; the alarm management; the delegating and reporting tools; the complete documentation of all systems and operator actions as well as the sophisticated redundancy provision, to suit each application and each user. The comprehensive user administration function and the universal audit trail together safeguard data protection and guarantee evidential quality of images and footage. G-SIM integrates seamlessly with all Geutebruck systems and with the vast range of third party interfaces they support, so it also facilitates the seamless processing and management of security information by subcontractors. Key features: Complete flexibility for any number of networked workstations Intuitive operation using individually designed site-plan-based operator interfaces Ideal overview thanks to the seamlessly integrated video wall solutions Complete video stream management for live and recorded video Efficient alarm management with site plans, video and all other relevant information Comprehensive support for delegation, i.e. for the hand-over of event or alarm processing, the allocation of tasks and for switching internal system communication between users Perfect data protection as a result of the flexible administration of user rights and the complete audit trail High reliability backed up with sophisticated redundancy Freely scalable even for very extensive systems Management of all subcontractors and third party systems integrated into the Geutebruck systemAdd to Compare
G-Tect/MoP is a new motion privacy (MoP) function which pixelates moving objects in live displays or in already archived image data. This Geutebruck innovation provides an additional data protection safeguard by reliably maintaining individual privacy when monitoring sensitive public areas. This form of masking allows observers to identify any relevant incidents and to follow events in the scene in some detail but prevents them from recognising the identity of individual people or objects. Operators with appropriate system user rights can still access original un-pixelated video for investigating important details in critical surveillance situations, and un-masked video can still be made available for evidential purposes.The G-Tect/MoP function software runs on the client unit and is integrated into Geutebruck’s GSCView operating software for GeViScope and re_porter devices. It can be applied to video in all standard and megapixel formats, live and/or recorded. Masking can take the form of pixelation or smear and it can be applied simultaneously to as many licensed channels as desired.Add to Compare
Geutebruck’s G-Tect/VMX is a new video motion detection solution for professional use, which is both extremely quick to set up and exceptionally reliable. It not only detects movement but differentiates between potentially relevant moving objects and background changes. G-Tect/VMX continuously analyses and evaluates all picture contents, and regularly adjusts its ‘understanding’ of the background. Thanks to the latest smart algorithms which continually adapt to the current image contents, G-Tect/VMX offers unprecedented accuracy at suppressing unwanted alarms caused by systematically occurring environmental effects such as moving foliage, rain, snow or headlights. It recognises these images changes resulting from weather as a systematically occurring background changes and therefore tolerates them. Setting up a sterile zone where any intruder triggers an alarm is a simple mouse-clicking operation. Configuring direction-dependent detection for a zone is quick and easy too. You can then copy settings across to other alarm zones and cameras with similar site conditions, for example to set up a series of cameras to monitor a fence. Finally there is a single intuitive global sensitivity control to optimize all the settings. – This minimalist design approach to system settings slashes the time required for system installation and makes it predictable. G-Tect/VMX is designed for seamless integration in the Geutebruck system world and comes with license-free activation of Geutebruck’s classic VMD detector, to enable legendary dual sensor operation and the best possible protection of critical areas. Also being unveiled alongside this detection solution is Geutebruck’s new G-Tect/MoP pixelating function which maintains data protection privacy for public access areas by automatically masking moving objects in live displays or archived image data while still allowing authorized personnel access to the full image for serious incident investigation and evidential purposes. Other innovations on the Geutebruck stand at Security 2012 include: the G-Scope/1000 range of new compact video platforms for top performance in tight spots; a new range of G-VRaid units; the re_porter-XRdb with a hot swap database as well as G-SIM the exceptionally powerful new video management system for large complex installations. To see for yourself visit stand 409 in hall 2 at Security 2012 or go to www.geutebrueck.com for more information.Add to Compare
‘Hybrid was yesterday; the future is omnibrid,' is how Geutebruck is heralding the introduction of its new generation of setup and operating software for GeViStore and GeViScope platforms this spring. Not only does this high performance software support analog, digital and megapixel cameras as well as ONVIF-compliant IP cameras and even16/9 HD-format ones, but it also enables any M-JPEG and H.264 based standard digital compression processes (including specialist video surveillance ones like MPEG4CCTV, H264CCTV) to be used in the same system. This multi-standard capability means that more than one compression standard can be used in one single system and the end-user is no longer tied to one particular process. And, if a camera signal is not available from the source in the optimized MPEG4CCTV format, then the M-JPEG stream can be trans-coded in real time.From Geutebruck's point of view the arrival of ‘omnibrid' software marks another significant step towards achieving the ultimate goal of producing video security systems which record only those images which are really relevant to the user, and which give him the best possible conditions for extracting the valuable information from them. Geutebruck's video sensors and intelligent video analysis software already offer a reliable and proven means of efficiently selecting, managing, and minimizing relevant material for onward transmission and/or recording, while its own specialist, CCTV-friendly, standard-compliant compression processes retain fluid motion, and consequently valuable detail, in situations and processes where the vast majority of other H.264 implementations only hesitate and shudder. However, until now the only IP cameras whose video stream could be processed using Geutebruck's video analysis software have been those few with added functionality.‘Omnibrid' software lifts this restriction and opens the door for much greater flexibility in product selection. It also provides more scope for intelligent data management, enables the use of different compression formats for different purposes, and gives system designers much more scope to achieve optimum customisations.Add to Compare
Geutebruck CCTV systems can now retain high quality video for long periods using only a fraction of the normal storage capacity. Their new ‘fading long term memory' (FLTM) option reflects the fact that, where different kinds of event are discovered, handled and investigated in different timescales; there is no real need to continue storing video at the full 25 fps for a month or more, if lower frame rates suffice after the first few days. FLTM software therefore enables you to progressively reduce the frame rate of your stored footage as time goes by, in accordance with your assessment of residual risks.Let's imagine your system has to deal with robbery, vandalism and fraud, and you have to retain a video record for 30 days. Robberies are discovered and pursued promptly, so within three days all relevant 25 fps footage has been reviewed and backed up. Vandalism is dealt with in a week and 6-7 fps footage is adequate. The timescale for fraud is longer but 1 fps provides the necessary evidential detail. Normally, for high quality real-rime video @ 4Mbit/s, storage per camera would be about 43.2 GB per day, or 1.3 TB for 30 days. But with FLTM you only need: 3 days @ 25 fps ≈ 130 GB + 4 days @ 6.25 fps ≈ 90 GB (differential compression reduces data by about 50%)+ 23 days @ 1 fps (I-frames only) ≈ 70 GB A total of only 290 GB per camera - which enables you to make significant hardware savings without any loss of benefit, utility or security.Add to Compare
Geutebruck's new ANPR software for its GeViScope and re_porter digital CCTV system platforms is available as a fully integrated option on new equipment or as an easy upgrade for existing installations. Suitable for use with moving or stationary vehicles up to 20 metres away traveling at speeds of up to 100km/hour; this real time ANPR analysis function delivers a recognition accuracy of 96% under optimal conditions. You can run the function on any video channel or channels irrespective of whether the image source is analog or digital, so long as you hold a separate licence for each channel.By combining the associated metadata with the picture data, the software module ensures that your system's video database can be searched by registration number or other factors. It offers a black & white list holding up to 1000 entries, and the opportunity to group number plate data into categories, for example by vehicle type. It can trigger a variety of configurable system actions according to the specific status category of the identified vehicle and is consequently ideal for controlling the automatic operation of barriers or gates to parking or loading areas and private property.Add to Compare
Geutebruck's new ‘VA-Missing' software reliably detects the removal of static objects from video-monitored scenes in museums, galleries and other exhibition venues, and in some environments it also provides useful information on abandoned objects. VA-Missing compares the current image with its own background model of the scene and checks out discrepancies for matches with freely-defined criteria such as location, duration and object size (corrected for perspective). It avoids unwanted alarms by continually updating its background model to incorporate gradual changes - such as slow moving shadows, and by suppressing transient changes - such as those generated by passers-by.Now available as an integrated option in new equipment or an easy upgrade for GeViScope CCTV platforms, VA-Missing can be run on any video channel irrespective of whether the image source is analog or IP. Separate licence activation is required for each channel. More details available here.Add to Compare
Geutebruck video analysis algorithms are already deployed in more than 50,000 digital video cameras round the world. Now, with its latest software offering, VCA4IP, Geutebruck is making these tried-and-tested professional video content analysis algorithms available for installation in third party IP cameras when used with re_porter or GeViScope CCTV systems. Activity detection (AD), video motion detection (VMD) and Dual-Sensor functions are each available separately by individual licence. AD provides reliable movement detection for indoor and selected outdoor applications with a very low false alarm rate owing to the effective suppression of environmental influences. For critical outdoor applications where you want to differentiate between objects of different sizes, movements in different directions and at different speeds, then VMD is the best choice. It can ensure that permitted movements don't trigger unnecessary alarms, by for instance, ignoring vehicles leaving a site, or small animals straying into the scene. For exceptionally high targeting accuracy and even better suppression of unwanted alarms, Geutebruck's Dual-Sensor uses video motion detection and object classification algorithms in parallel, with alarms only being triggered when both sets of criteria are met.VCA4IP can process resolutions up to several megapixels. Built-in diagnostics report sabotage and monitor the connection status and contrast levels to avoid the generation of false reports. Any number of parameter profiles (day/night switches) can be stored for each camera channel. All camera channels are easily configured in the standard user-friendly set-up screen.Add to Compare
Browse Video Surveillance software
Video Surveillance software products updated recently
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
H.265 High Efficiency Coding: Video Compression For Security ApplicationsDownload
How To Overcome The Storage Challenges Of Adopting Surveillance AIDownload
Physical Security Supports A Future-Proof Cyber Security StrategyDownload
- Gruppo Peroni Race Utilizes Hikvision IP Video Products To Make Races More Accessible To The General Public
- Genetec Announces Its Security Center Deployed By New Orleans To Enhance Public Safety
- HENSOLDT Delivers 300th MUSS Equipment Set For The German Army’s ‘Puma’ Infantry Fighting Vehicle
- March Networks Provides Video Surveillance Solutions At Leon Medical Centers