MxEasy: Intuitive Control Software For All MOBOTIX Security Cameras
MxEasy: Intuitive Control Software For All MOBOTIX Security Cameras

The intuitively designed user interface of the new MOBOTIX MxEasy offers quick access to all the main camera functions. This software represents an innovative new approach to the monitoring and controlling of MOBOTIX cameras. Up to 16 cameras can be managed using the software's easy-to-understand layout and four cameras can be viewed simultaneously. All of the camera settings in MxEasy - such as image section, zoom, brightness, volume, microphone sensitivity, image storage, connections - are immediately active and instantly stored to the current camera's configuration file.The software's calendar functions are an innovative tool for managing time-based settings, for single as well as multiple cameras. For example, it is now possible for the first time not only to control the recording time according to dates and times, but also to activate/deactivate the motion sensor, brightness or the microphone in a time-controlled way. Easy-to-use video management softwareIdeally designed for the wide range of functions of the MOBOTIX camerasMonitoring of up to 16 MOBOTIX camerasSupports decentralized system concept and works with internal camera recording Simple, quick setup; user-friendly and intuitive operationTransparent layout of operating elements; compatible with touch panelsIdeally suited for small office and home security environmentsPlatform-independent format (Windows, Mac, Linux)! Absolutely free of charge! MxEasy is available for Microsoft Windows, Linux and Mac OS X operating systems as a free download.

Add to Compare
Geutebruck Introduces The Next Generation Of ‘omnibrid’, Multi-standard Operating Software
Geutebruck Introduces The Next Generation Of ‘omnibrid’, Multi-standard Operating Software

‘Hybrid was yesterday; the future is omnibrid,' is how Geutebruck is heralding the introduction of its new generation of setup and operating software for GeViStore and GeViScope platforms this spring. Not only does this high performance software support analog, digital and megapixel cameras as well as ONVIF-compliant IP cameras and even16/9 HD-format ones, but it also enables any M-JPEG and H.264 based standard digital compression processes (including specialist video surveillance ones like MPEG4CCTV, H264CCTV) to be used in the same system. This multi-standard capability means that more than one compression standard can be used in one single system and the end-user is no longer tied to one particular process. And, if a camera signal is not available from the source in the optimized MPEG4CCTV format, then the M-JPEG stream can be trans-coded in real time.From Geutebruck's point of view the arrival of ‘omnibrid' software marks another significant step towards achieving the ultimate goal of producing video security systems which record only those images which are really relevant to the user, and which give him the best possible conditions for extracting the valuable information from them. Geutebruck's video sensors and intelligent video analysis software already offer a reliable and proven means of efficiently selecting, managing, and minimizing relevant material for onward transmission and/or recording, while its own specialist, CCTV-friendly, standard-compliant compression processes retain fluid motion, and consequently valuable detail, in situations and processes where the vast majority of other H.264 implementations only hesitate and shudder. However, until now the only IP cameras whose video stream could be processed using Geutebruck's video analysis software have been those few with added functionality.‘Omnibrid' software lifts this restriction and opens the door for much greater flexibility in product selection. It also provides more scope for intelligent data management, enables the use of different compression formats for different purposes, and gives system designers much more scope to achieve optimum customisations.

Add to Compare
Proxim Releases ProximVision ES Version 2.5 With Enhanced Features And Product Supports
Proxim Releases ProximVision ES Version 2.5 With Enhanced Features And Product Supports

The latest version of  Proxim Network Management System enables diagnostic report, improved inventory management and support all Proxim's latest products. You can download a free copy of PVES that manages up to 4 devices.ProximVision ES currently supports the following Proxim products:Tsunami™ MP 8100 high throughput point to multipoint seriesTsunami™ MP 8160 high throughput point to multipoint seriesTsunami™ QB 8100 high throughput point to point seriesTsunami™ MP.11 series (5GHz, 4.9GHz, 2.4GHz* and 900MHz*)Tsunami™ MP.11 HS 245054Tsunami™ MP.16 seriesTsunami™ QB.11 series (5GHz, 4.9GHz, 2.4GHz* and 900MHz*)ORiNOCO® 802.11n Access PointsORiNOCO® indoor and outdoor Mesh Access PointsRapid network deploymentProximVision ES automates configuration processes for faster, more efficient deployment of Proxim Wireless networks. Automatic configuration capabilities enable network managers to quickly replicate existing network settings across new network nodesUser-friendly interface enables you to group, manage and configure all devices available on your wireless networkAuto discovery of network devices makes identifying devices for configuration a snapMobile configuration capabilitiesProximVision ES gives network managers a mobile option for exhaustive device configuration with a software tool. Network managers take configuration capabilities with them to address isolated networksExhaustive device configuration capabilitiesProximVision ES segments the overall network, enabling simpler mobile monitoring and management of the network and devicesGeographical Network View and Statistical PlotsProximVision ES provides a map overlay of your entire network with real-time, visual network status indicators Use the built-in map location tool to create a geographic view of your network and placement of your wireless devices.Devices and link status can quickly be determined thanks to colour coded icons.Network administrator can plot statistical information such as link SNR, traffic load and other metrics to evaluate network health and manage bottlenecks.Dynamic Map supports device placement at the configured GPS co-ordinates. Also extends support to change the existing device positions on the Dynamic Map by drag and dropUse Static map feature to place devices on a static map that are located in closed spaces such as buildings and offices; Also enables to edit and save existing static maps using Pre-Configured Image Editor from within PVESGreater ease of use and upgradabilityProximVision ES can support a greater number of devices than competitively priced solutions, and provides the simplest path to configuration and upgrade. Once networks are configured and deployed, ProximVision ES provides the ability to automatically reconfigure or perform firmware upgrades on an entire group of devices simultaneouslyReal-time monitoring of devices across the entire wireless network, providing diagnostics and alerts to quickly identify errors and troubleshoot themIntegrated device inventory and per device diagnostic reports enables quick assessment of the network

Add to Compare

Video Surveillance software - Expert commentary

The Global Biometrics Trends Review
The Global Biometrics Trends Review

The global biometrics market has been recently developing rapidly, and this trend will continue shortly. If in 2018 its volume was estimated at $23.4 billion, according to the forecast of the analytical company BCC Research, the market size may increase to $71.6 billion with an average annual growth rate of 23.2 % by 2024. Fingerprint scanning, facial recognition, iris, vein, and voice technologies are expected to be implemented at the fastest pace. The analysis is based on the revenue indicators of key players depending on segments, including hardware, software, and integration. Biometric electronic documents Another analytical Agency, Acuity Research, estimates that the number of biometric electronic IDs will increase by about 3.5 billion electronic documents in the world. Moreover, more than half of the UN member States issue biometric passports. Government and private contracts of Canada, the United States, Belarus, Ukraine, Moldova, Lithuania, Hungary, Bangladesh, Senegal, and other countries are examples of implementation of programs for the transition to biometric electronic documents. Government organizations in various countries believe that biometrics is one of the most effective ways to identify refugees and those who cross the border. Now there are a lot of projects which are based on biometric technology. Biometric identification system Perhaps one of the most ambitious is the Aadhaar project being implemented in India Perhaps one of the most ambitious is the Aadhaar project being implemented in India. It is a biometric identification system that contains the data of more than a billion people. The database contains about 10 billion fingerprint templates, two billion iris templates, and a billion photos. There is another ambitious project at the Nairobi Jomo Kenyatta International Airport, where RecFaces company has implemented a passenger facial identification ready-made solution, that helps the security guards to receive notifications about airport visitors in just a few seconds and increase the efficiency of security services at least by 30%. The introduction of biometric identification of passengers aimed at increasing the level of airport security, as well as quickly obtaining information about the detection of wanted persons, stored in the long-term archive. Automated control gates As another example, face match is used at border checks to compare the portrait on a digitized biometric passport with the holder's face. In 2017, Thales company was responsible for supplying the new automated control gates for the system of Automated Fast Track Crossing at External Borders at Roissy Charles de Gaulle airport in Paris. This solution has been devised to facilitate evolution from fingerprint recognition to facial recognition This solution has been devised to facilitate evolution from fingerprint recognition to facial recognition during. Governmental systems, SmartCity, airports projects using identification technologies day by day become our reality and influence the growth of the biometrics market globally. Countries are studying the experience of each other and adopting it. Paperless payment technologies The global market of biometrics will shift all industries, starting from the transportation facilities especially airports, where a transition from traditional VMS and ACS to paperless biometric self-Boarding systems will be carried out. Sports facilities will see the development of paperless payment technologies at cash desks, and the banking sector — the payment systems with remote customer identification. HoReCa will transfer from staff time tracking systems to biometric payment systems, biometric check—in systems and the use of biometric identifiers. To sum up there are two most significant drivers of this growth are surveillance in the public sector and numerous other applications in diverse market segments.

Safer Streets Require Real-Time Video Analytics
Safer Streets Require Real-Time Video Analytics

The UK government recently announced a doubling of the Safer Streets Fund to £45 million, as it seeks to reassure the public that safety is a top priority, as the night-time economy makes a return. More than just surveillance While this funding increase is much needed, it’s vital that the government and local councils use the money strategically, or risk missing out on a great opportunity to deliver real change and enhance safety across the United Kingdom. One of the main strategies cited by the government is to increase the current vast number of CCTV cameras installed across the country, despite the fact that the UK is already one of the most surveilled nations in the world. Investing in video analytics London alone has around 700,000 cameras, but to effectively monitor them all would be an incredibly inefficient use of manpower and require a huge number of staff. Therefore, I believe the clearest and most cost-effective way for this project to succeed in its overall mission, is by investing in smarter technology, such as video analytics. Incorporating video analytics into existing infrastructure is the clear solution This technology offers a more efficient use of resources, faster response times and enables more informed, time-critical decision making, when reacting to unfolding events in real time. Incorporating video analytics into existing infrastructure is the clear solution, as the technology enables legacy assets, such as analog CCTV cameras, to become more than just after the fact evidence gathering tools and instead be used to help enhance real-time responses to unfolding incidents. Artificial intelligence-enabled solutions Artificial intelligence-enabled solutions are trained using vast datasets of images and video footage, in order to better understand people, objects and vehicles that are captured on film, and they continue ‘learning’ and improving, while in use. The system’s algorithms analyze and prioritize input from video data to decide which inputs are of value, automatically classifying the footage and notifying security personnel accordingly. This reduces response times by notifying CCTV operators of an incident, as it happens, meaning law enforcement and security personnel can react faster and intervene in an ongoing situation. Edge technology and real-time video streaming A key consideration should be choosing a technology that can operate at the edge and deliver real-time video streaming, even at the lowest bandwidths, so it isn’t limited to use in areas with good connectivity, which would exclude most remote areas. Quality really does matter and technology that can operate over low bandwidths is crucial for allowing operators to zoom in on areas of interest, such as a car number plate or face, and retrieve full-resolution images that can make a real difference in ongoing investigations. Analytics-based security approach Introducing an analytics-based security approach would also help curtail the rising cost of tackling crime Introducing an analytics-based security approach would also help curtail the rising cost of tackling crime. Research conducted by the UK’s Labour Party recently found that the annual cost of crime reached a staggering £100 billion. While statistics show that crime rates in general have been fairly stable over recent years, experts point to the increase in specific types of violent crime, such as knife crime which rose by over 20% during 2020. Implementing smart analytics-based technology Implementing smart analytics-based technology would help maintain staffing costs, as the system can identify incidents without an operator’s input, as well as reducing the cost of managing crime, as more incidents will be intervened in before they escalate too far. This dramatically reduces the burden on staff and allows a single surveillance operator to monitor many more cameras. On the other hand, this level of automation also reduces false alarm fatigue and operator overload, which can quickly sap efficiencies and reduce operator alertness, if left unchecked. Data driven problem-solving approach to crime prevention Procurement officials should avoid the common mistake of simply doubling down and throwing more staff and security assets at the problem to bring results. Instead, they should take a more data driven problem-solving approach to crime prevention by leveraging technologies that can enhance response and preserve their existing investments in cameras. The smart use of real-time video analytics could make the difference by preventing dangerous situations from escalating into serious incidents.

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Related white papers

Monitoring Traffic Flow: Everywhere, All The Time

Delivering a Smart, Secure and Healthy Workplace with Cloud

Cloud Video and Smart Cities