Aimetis Announces Aimetis E3200 Physical Security Appliance: Video Management, Analytics And Business Intelligence In All-in-one Network Appliance
Aimetis Announces Aimetis E3200 Physical Security Appliance: Video Management, Analytics And Business Intelligence In All-in-one Network Appliance

Aimetis Corp., a global leader in intelligent IP video management software, launched here at ISC West its first hardware offering, Aimetis E3200 an all-in-one appliance to combine video analytics, video management and business intelligence into one device. The company also announced a license plate recognition application.Powered by Aimetis Symphony video management and analytics software, the Aimetis E3200 all-in-one appliance is designed for small footprint retailers, service stations, construction trailers and others that require simple installation and a compact size.The fanless appliance takes up very little space (approximately the size of an Encoder). It can be either DIN-rail or wall mounted, making it ideal for customers with limited space or challenging environments. Unlike other IP video appliances, the E3200 includes video analytics and business intelligence reports for applications such as people counting, dwell time and heat maps for showing graphically where people are walking and how long they spend standing at a specific location. In addition, Aimetis E3200 is ONVIF compliant, so it can be used with any cameras from compliant manufacturers."The Aimetis E3200 appliance significantly simplifies and reduces the cost of IP video deployment," said Marc Holtenhoff, CEO, Aimetis Corp. "The solution is easy to install and less complex than other IP-based systems, making it well suited for customers that have not fully adopted IP-based systems due to the intricacies involved. Its compact size makes it ideal for customers that don't have a server room because it mounts just like an alarm panel."Availability and Pricing Plus Limited Time OfferThe Aimetis E3200 is available in two models: The Aimetis E3205 includes 500GB internal storage and 4 camera licenses, and a MSRP of $1,895.00 US. The Aimetis E3210 ships with 1TB internal storage capacity and 8 camera licenses and has a MSRP of $2,295.00 US.Both models include Aimetis Standard licenses and can be upgraded to enterprise licenses, which include analytics. As a launch promotion, the first 200 units will include 1 free enterprise license. This special offer enabled analytics like people counting, dwell time and more.

Add to Compare

Browse Video Surveillance Transmission System

Analog Transmission - Expert commentary

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Physical Security And The Cloud: Why One Can’t Work Without The Other
Physical Security And The Cloud: Why One Can’t Work Without The Other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.

HD Over Coax Provides Cost-effective Video Surveillance Upgrade
HD Over Coax Provides Cost-effective Video Surveillance Upgrade

According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analog, many end users looking for high definition (HD) video quality have been forced to take on a complete system overhaul. Infrastructure Overhaul For HD Video To make the switch, customers would need to change everything, from cameras to hardware to wiring– not to mention the lengthy installation process that would ensue. IP cameras also require higher Internet speeds and more cloud space. Whether constrained by budget, bandwidth or storage, many end users have been unable to adopt this new video surveillance method.Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike. By utilising the current Coaxial cables, this offering yields high definition video, while requiring minimal infrastructure changes and is an optimal surveillance choice for security customers. Plus, with new advancements and updates being made frequently to this technology, there is a solution for every security need. The enhanced alternative of HD over Coax has been warmly welcomed in the security industry, thanks to its simple solutions and ever-evolving features. Many new analog HD cameras are “plug and play,” able to connect directly to existing Coaxial cables. This eliminates the need for a complete system change, creating cost-savings for the end user and an enhanced video quality offering. Easy Solutions For HD Video As a result, integrators can cost-effectively upgrade their customer’s surveillance solution while using their legacy infrastructure, making it an attractive option for end users and an easy sell for dealers. Latency in video is another common issue with network-based camera systems, where even the slightest delay in video surveillance can hinder security response HD over Coax cameras themselves are always expanding and evolving to meet a wide array of security needs. With the introduction of fisheye and multi-sensor cameras, users now have a multitude of coverage options, not to mention the introduction of 4K bringing resolution options to the same level as IP. Some newer technologies are even touting 4K cameras paired with 4K digital video recorders (DVRs) made specifically for analog systems. Longer cables grant transmission for up to 1600 feet, double the distance of standard analog solutions, and triple that of IP systems. This single cable is able to transmit both HD video and audio. Recently, broadcast quality audio over Coax has become available in limited models, a substantial improvement over older analog technology, which was unable to transmit audio. Stopping Video Delay Latency in video is another common issue with network-based camera systems. Even the slightest delay in video surveillance can hinder security response. IP cameras are forced to compress and packetize their video for transmission. The outcome of this is a reduced number of images per video, which in turn causes delay. HD over Coax on the other hand, delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity. Additionally, the point-to-point transmission delivers uncompressed video free of lag. Another touted benefit is that, unlike IP networked cameras, analog systems provide a more secure video transmission. With so much sensitive information housed on a businesses’ network, adding another point of network access through an IP camera can create concerns for cyber security risks. HD over Coax delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity Preventing Network Hacking With HD over Coax, the physical connections between the camera and DVR prevent network hacking. By keeping the video surveillance system offline, security professionals are able to direct their attention to the physical threats at hand, rather than having to focus on deterring cyber security risks. One of the primary difficulties of deploying HD video solutions is the fact that many older systems utilize a wide variety of HD standards and platforms. To make matters more complicated, after HD over Coax was brought to market, manufacturers raced to create their own version of this technology. Today, the most popular proprietary standards are HD-CVI, HD-TVI and AHD. However, integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible.Integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible Diversifying Surveillance Through One DVR To combat these issues, manufacturers have introduced products with more flexibility to their portfolios. One example of this is the penta-brid DVR which grants the ability to seamlessly integrate multiple technologies deployed across one application. This means that systems with diverse camera brands and technologies, such as a mix of HD-CVI, HD-TVI, AHD, analog or IP, can be connected through one DVR. For many end users with legacy analog systems, penta-brid DVRs give them greater freedom to choose between a variety of solutions, rather than being limited to one option. With video resolution increasing, the space needed to store the footage is similarly rising. Penta-brid technology has been able to adapt to these evolving needs, giving users ample storage space to house the HD and 4K surveillance video with some of the newest models including H.265 compression.  HD Casino Surveillance Made Simple For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff While HD over Coax is beneficial to many end users and integrators, those in the casino and hospitality markets find it crucial. With a combination of high profile guests, large amounts of cash on hand, constant crowds and strict industry regulations, reliable video surveillance is a must. Deploying new IP systems comes at a stiff price. When looking to upgrade their video surveillance, casinos must also be mindful of the installation process. When moving to an IP-based system, ripping out old wires and replacing them with new is the standard practice. This practice can be both disruptive and costly, not to mention gaming regulations require casino activities be monitored at all times so a complete system shutdown would result in revenue loss. This cost can be hard to justify, especially when the current legacy analog system remains in working condition with only the lower image resolution to date it. For these scenarios, the most cost-effective option is to leverage the legacy infrastructure, replace the existing cameras with new devices, and reap the benefits that HD video has to offer without any lapse in security. For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff. HD over Coax cameras now offer the same resolution as IP cameras with a plug and play approach, that cuts down on expense without sacrificing quality. For businesses and applications that are unable to adopt IP technology, whether it be cost or time prohibitive, HD over Coax now features most of the same benefits IP has to offer without breaking the bank. By providing clear images in real time, maximizing existing infrastructure, and affording cyber security benefits, HD over Coax provides an attractive solution for many end users and integrators.

Latest Aimetis news

Senstar And Aimetis Showcases Perimeter Intrusion Detection And Video Management Solutions At Security 2018
Senstar And Aimetis Showcases Perimeter Intrusion Detection And Video Management Solutions At Security 2018

Senstar and Aimetis, a Senstar company, showcases perimeter intrusion detection and video management solutions at Security 2018. New products, including the Security Innovation Award finalist Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system, and Senstar Symphony 7.1 video management software, were on display at Booth 5C09. “Since the last Security show we have introduced exciting new products and have been working hard to transition Aimetis to the Senstar brand,” said Senstar’s VP of Sales – EMEA Fabien Haubert. “We look forward to demonstrating how bringing together the world’s largest portfolio of perimeter intrusion detection products and world-class video management software creates intelligent, integrated security solutions that provide true value for our customers.” Implement Video Analytics Products on display includes: The Senstar LM100 combines two key security functions in one cutting-edge product, acting as a powerful deterrent against intruders by detecting and illuminating them at the fence line. The Senstar LM100 is one of 13 finalists from 75 entries for the prestigious Security Innovation Awards to be presented at the show. Senstar Symphony 7.1 is the new benchmark for intelligent video management software (VMS) allowing for control of an entire video surveillance system Senstar Symphony 7.1 is the new benchmark for intelligent video management software (VMS) allowing for control of an entire video surveillance system from one central location. Users can connect and configure cameras, monitor open spaces, implement video analytics, and use centralized cloud management tools for multi-site management. Intelligent Surveillance System Symphony Analytics are ideal for businesses searching for a more efficient and intelligent surveillance system. License Plate Recognition – track, record and report vehicle license plates. Face Recognition – identify known and unknown individuals. Outdoor Object Tracker – classify people and vehicles, filtering objects by size and location FlexZone is a cable-based fence-mounted system that detects and locates any attempt to cut, climb or otherwise break through the fence. FlexZone adapts to most fence types and is ideal for sites of all sizes. Thin Client is a PC alternative designed to easily display 1080p video from 30+ network video manufacturers, as well as digital signage. Its easy setup and compact design are ideal for space constrained environments. For live demonstrations of the above products and others, visit Senstar at Security 2018 Booth 5C09.

Senstar Announces Start Of Transition Period To Bring Aimetis Under Senstar Brand
Senstar Announces Start Of Transition Period To Bring Aimetis Under Senstar Brand

Senstar has announced the beginning of a transition period to bring Aimetis under the Senstar brand. Senstar, a provider of perimeter intrusion detection systems (PIDS), acquired Aimetis, a provider of video management systems (VMS) and analytics, in April 2016. Since then, the two companies have worked in parallel to continue to provide PIDS and VMS solutions. However, over the coming months, Senstar and Aimetis will become one company, resulting in reduced complexity, improved performance, and unified support. Combining PIDS With VMS “Bringing together the PIDS expertise of Senstar with the VMS and analytics knowledge of Aimetis enables us to offer an unrivaled range of innovative security solutions and world-class support,” said Senstar President Brian Rich. “Throughout the transition period we are committed to ensuring as little disruption as possible to our business. Our customers and partners can expect the same accessible, responsive and flexible sales and support they have always relied on, and to be well-informed regarding any changes that may affect them.” The combination of PIDS and VMS addresses a growing trend in the security industry to reduce complexity by enabling customers and partners to source comprehensive security solutions from a single provider, resulting in reduced costs and greater accountability. Network Manager Integration Senstar is also pleased to introduce the integration of its Network Manager alarm reporting system and Symphony VMS (formerly Aimetis). Network Manager is a software gateway that allows communication with a wide array of Senstar sensors, including FlexZone®, FiberPatrol®, OmniTrax®, and UltraWave™. Symphony, the new benchmark for intelligent video management, is an ideal software solution for recording, monitoring and analyzing video from both single server installations and multi-server deployments. The integration enables Symphony to receive the full range of alarm and status information from Senstar sensors via an IP connection. For each sensor alarm the full range of Symphony’s security responses can be initiated, including commanding camera actions and providing visual and audio alerts.

Could Perimeter Intrusion Detection Benefit From USA Economic Uncertainty?
Could Perimeter Intrusion Detection Benefit From USA Economic Uncertainty?

With the current state of economic uncertainty, there is a huge opportunity in 2017 for perimeter intrusion detection (PID) manufacturers to reach the commercial market. Petty crime rates, such as theft and vandalism, are on the rise and, as a result, small business owners are looking for new security options to enhance their current camera and alarm systems. Often thought of as complicated, expensive, and only for high-value applications, PID has a chance to change its perception in the years ahead. The winners in this space will be security companies who can provide simple and reliable products at the right price point. Impact Of 2016 Presidential Election Presidential elections in the United States are of great importance to the security industry, with many companies trying to anticipate early on what the impact will be and to plan accordingly. The 2016 election was particularly interesting because of the extensive security and international trade narratives propagated by Donald Trump. Looking to 2017, with Trump taking office, the industry awaits news about if and when he will implement the measures he spoke about in his campaign. For Senstar, the aforementioned commercial PIDs opportunities will be a big focus for 2017. As well, we will continue to work to holistically integrate our new video/IVA capabilities with our PID products to offer our customers comprehensive perimeter security solutions. Convergence And Growth In 2016 Our predictions for the year 2016 were fairly accurate as the convergence of physical and cyber security continued and several low-cost radar solutions were developed and launched to address drones. In terms of the video/IVA market, which we correctly predicted would continue to grow in 2016, Senstar added video capabilities to our portfolio by acquiring Aimetis, a world-class video analytics and management company. Senstar is now poised to offer customers even more options for securing critical assets and infrastructure. One prediction that failed to materialize was an increased demand for fiber optic-based sensors. Sales in that space remained flat as potential customers for these products looked to more cost-effective copper-based solutions. See the full coverage of 2016/2017 Review and Forecast articles here  

Related white papers

Security Investments Retailers Should Consider For Their 2021 Budget