Axis Communications Video Servers (IP Transmission) / Video Encoders(23)
16 channels, Audio Input, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSa , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 1536 x 1152, NTSC: 30; PAL: 25, PTZ, 100 presets, 4x 512 MB RAM, 4x 128 MB Flash, 1,850, 0 ~ 50 C (32 ~ 122 F), 20 ~ 80, BNCAdd to Compare
16 channels, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSa , IEEE 802.1Xa , QoS Layer 3 DiffServ, FTP, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 1536 x 1152, NTSC: 30; PAL: 25, PTZ, 100 presets, 4x 512 MB RAM, 4x 128 MB Flash, 1,850, 0 ~ 50 C (32 ~ 122 F), 20 ~ 80, BNCAdd to Compare
4 channels, Audio Input, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSb , SSL/TLSb , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 1536 x 1152, 30, PTZ, 100 presets, 512 MB RAM, 128 MB Flash, 570, 8 W, 8 ~ 20 V DC, PoE, 0 ~ 50 C (32 ~ 122 F), 20 ~ 80, BNCAdd to Compare
4 channels, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSa , SSL/TLSa , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 1536 x 1152, 15, PTZ, presets, 512 MB RAM, 128 MB Flash, 570, 7 W, 8 ~ 20 V DC, PoE, 0 ~ 50 C (32 ~ 122 F), 20 ~ 80, BNCAdd to Compare
4 channels, Audio Input, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSb , SSL/TLSb , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 1536 x 1152, 30, PTZ, presets, 512 MB RAM, 128 MB Flash, 210, 6 W, 12 V DC, 0 ~ 45 C (32 ~ 113 F), 20 ~ 80, BNCAdd to Compare
6 channels, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSa , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnPTM, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 720 x 576, NTSC: 60; PAL: 50, PTZ, 100 presets, 6x 256 MB RAM, 6x 256 MB Flash, 303, 16.3 W, 12 V DC, 0 ~ 45 C (32 ~ 113 F), 10 ~ 85, BNCAdd to Compare
4 channels, Audio Input, H.264/M-JPEG, IPv4/v6, HTTP, HTTPS*, QoS layer 3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, PAL: 720 x 576; NTSC: 720 x 480, NTSC: 30; PAL: 25, PTZ, 100 presets, 4x ARTPEC-3, 4x 256 MB RAM, 4x 128 MB Flash, 229, 13 W, 12 V DC, 0 ~ 45 C (32 ~ 113 F), 20 ~ 80, BNCAdd to Compare
1 channels, Audio Input, H.264/M-JPEG, IPv4/v6, HTTP, HTTPS*, QoS layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 720 x 576, NTSC: 60; PAL: 50, PTZ, 100 presets, 256 MB RAM, 128 MB Flash, 520, 5.3 W, PoE, 8 ~ 28 V DC, 0 ~ 60 C (32 ~ 140 F), 10 ~ 85, BNCAdd to Compare
1 ~ 4 channels, Audio Input, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSa , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnP™, SNMPv1/v2c/v3 (MIB-II), DNS, DynDNS, NTP, RTSP, RTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, 1536 x 1152, 30, PTZ, 100 presets, 512 MB RAM, 128 MB Flash, 800, 10 W, PoE, 8 ~ 28 V DC, 20 ~ 24 V AC, -40 ~ +75 C (-40 ~ +167 F), 10 ~ 95, BNCAdd to Compare
1 channels, H.264/M-JPEG, IPv4/v6, HTTP, HTTPSa , SSL/TLSa , QoS Layer 3 DiffServ, FTP, CIFS/SMB, SMTP, Bonjour, UPnPTM, SNMP v1/v2c/v3(MIB-II), DNS, DynDNS, NTP, RTSP, RTP, SFTP, TCP, UDP, IGMP, RTCP, ICMP, DHCP, ARP, SOCKS, SSH, Analog composite video BNC input, RJ45 10BaseT/100BaseTX PoE, RS-485/422, PAL: 720 x 576; NTSC: 720 x 480, 30, PTZ, presets, Windows XP, Windows Vista, Windows Server 2008, Windows 7, Windows 8, Windows Server 2012, DirectX 9c or higher, 256 MB RAM, 256 MB Flash, 90 x 29 x 38, 71, PoE, 0 ~ 50 C (32 ~ 122 F), 10 ~ 85Add to Compare
Axis video server rack solution helps large, surveillance installations manage Axis video servers in a professional environment. Features include: Quick and professional installation of various video servers in the same rack Expandable system, simply by adding blades and wiring up Integrated power supply, for easy installation/expansion Higher density of video channels compared to standalone solution Improved serviceability and trouble-free unite replacement Designed for improved serviceability and quick replacement of units, the rack holds up to 3 interchangeable and hot-swappable blades. There is no need to power down when installing or changing blades. The Axis video server rack combines high reliability and functionality with quick, flexible and professional installation. Axis video server rack solution for blade video servers The Axis video server rack solution offers improved serviceability and trouble-free unit replacement or expansion - simply add more blades. The rack provides serial communication and I/O connectors at the rear of each slot, and a single network connection together with integrated power for simple installation. There is no need to power down when installing or changing blades. AXIS 291 1U combines high reliability and functionality with quick, flexible and professional installation. Flexibility AXIS 291 1U is designed for applications that need to be able to expand, not only by adding more channels, but also by using different types of cameras. It is ideal for airports, hotels and train stations or other premises where analog cameras are already installed.Add to Compare
Superb video qualityMultiple H.264 streams Image setting adjustment Intelligent video capabilities Power over Ethernet Audio support Local storage High-performance, single-channel solutionAXIS Q7401 Video Encoder is a high-performance, single-channel solution that integrates an analog camera into an IP-based video surveillance system. With outstanding video processing capabilities, AXIS Q7401 delivers superb video quality and significant savings in bandwidth and storage.Reduced bandwidth and storage needsAXIS Q7401 offers the highly efficient H.264 video compression, which drastically reduces bandwidth and storage requirements without compromising image quality. Motion JPEG is also supported for increased flexibility. Full frame rate in all resolutionsAXIS Q7401 can deliver multiple, individually configurable video streams simultaneously at full frame rate in all resolutions up to D1 (720x480 in NTSC, 720x576 in PAL). This means that several video streams can be configured with different compression formats, resolutions and frame rates for different needs.Wide range of analog PTZ cameras supportedAll Axis video encoders connect to analog pan/tilt/zoom (PTZ) cameras to allow for easy operation of these PTZ cameras across the IP network. Axis' open policy ensures simple and fast integration with most analog PTZ cameras on the market by including software drivers for more than 25 different analog cameras, including products from American Dynamics, Bosch, Canon, Panasonic, Pelco, Philips, Samsung, Sensormatic and Sony.Easy installationSupport for Power over Ethernet (IEEE802.3af) enables the unit, as well as the analog camera that is connected to it, to receive power through the same cable as for data transmission. This makes for easy installation since no power outlet is needed.Add to Compare
AXIS 241QA Video Server delivers high quality video over IP networks. Supported by the industry’s largest base of surveillance applications, they offer digital benefits for analog surveillance systems, including two-way audio, motion detection and remote pan/tilt/zoom control. They provide simultaneous MPEG-4 and Motion JPEG streams in resolutions up to 768x576, allowing optimisation both for image quality and bandwidth efficiency. Key function enhancements include:High quality video at 25/30 frames per second per channel Simultaneous Motion JPEG and MPEG-4 streams in resolutions up to 768x576 Video motion detection and pre/post-alarm buffer Support for PTZ units HTTPS encryption for network security Integrated two-way audio supportAdd to Compare
Audio Input, Alarm Input, HTTP, HTTPS, SSL/TLS, TCP, SNMP, RTSP, RTP, UDP*, 10Base-T/100Base-TX Ethernet, 768 x 576, 30, Pentium III CPU 500 MHz or higher, 128 MB RAM, Internet Explorer 5.x or later, Windows XP, 2000, NT4.0*, ME* or 98, 19 x 79 x 82, 60, 8 W, 8 ~ 20 V DC, 5 ~ 50, 20 ~ 80Add to Compare
M-JPEG, MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer 3 DiffServ, FTP*, RJ-45 10BASE-T/100BASE-TX PoE, Windows XP, Vista, 2000, Server 2003 DirectX 9c or higher, 32 x 99 x 118, 335, 13.7 W, 34 VDC, 24 VAC, PoE, 0 ~ 50, 20 ~ 80Add to Compare
Browse Video Servers (IP Transmission) / Video Encoders
- Axis Communications
Video server (IP transmission) products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Several video manufacturers have participated in the development of a U.K. 'Secure by Default' baseline standard to ensure cybersecurity measures are included in equipment as it leaves the factory. The standard includes ensuring that passwords must be changed from the manufacturer default at start-up, that chosen passwords should be sufficiently complex to provide a degree of assurance, and that controls are placed around how and when remote access should be commissioned. The standard aims to ensure security products are cyber- and network-secure by default and out of the box. The concept is that network video products will ship to installers in the most hardened, cyber-security-optimal form possible, with default settings that provide minimal vulnerabilities on first use. Secure by Default is a self-certification scheme that allows manufacturers to assess their systems for compliance and to apply for the U.K. Surveillance Camera Commissioner’s Secure by Default mark. The mark demonstrates to installers and customers that they are a competent manufacturer who takes the security of their products seriously. The Secure By Default mark demonstrates to installers and customers that they take the security of their products seriously Axis, Bosch, Hanwha, HikVision and Milestone Systems participated in developing the standard, which was officially unveiled at the IFSEC 2019 show. “The launch of the standard is not the end of the journey, but rather the beginning of something unique, exciting and vital for the future success of video surveillance,” says cybersecurity consultant Mike Gillespie, who works with the National Surveillance Camera Strategy for England and Wales. The standard has been developed so as not to present a barrier to entry The manufacturer standard is intended to lay out the basic areas where all video surveillance systems should be secure, regardless of their intended use, whether in public space or not, says Gillespie. “This is very much intended to be an entry-level standard and has been written with the intention of providing [video] manufacturers with a minimum baseline level all should aspire to,” he says. The standard has been developed so as not to present a barrier to entry for any competent and responsible manufacturer, he adds. The Secure by Default standards form part of a wider set of cyber security proposals from the Surveillance Camera Commissioner for the UK Home Office. Adoption within the industry Hanwha Techwin has embraced Secure by Default as part of its comprehensive approach to cybersecurity. “Although we appreciate security needs to be easy to implement, we do not allow for a default password to be used,” according to Hanwha Techwin. “We consider it essential that a secure password be set up during the initial installation process, which is why we prohibit the consecutive use of the same letter or number and we encourage the use of special characters as well as a combination of letters and numbers.” Hanwha Techwin’s approach has been to make security a fundamental feature of cameras and recording devices. Cybersecurity has been taken into account at the start of the design and development process, and not just treated as an optional feature. Article 25 mandates that organizations put in place appropriate technical and organization measures Axis is aligned with the Secure by Default principles recommended by the U.K. National Cybersecurity Strategy Code of Practice. Furthermore, General Data Protection Regulation (GDPR) makes data protection and security by design and default a legal requirement. Article 25 mandates that organizations put in place appropriate technical and organization measures designed to implement data protection in an effective manner. Gary Harmer, UK and Ireland Sales Director for Hikvision, said the new Secure by Default scheme is a further positive step forward for the industry, one which Hikvision fully supports. “The process of developing these standards has been one of open collaboration between companies across the network video security industry,” he said. “It’s a truly positive and genuine initiative geared towards creating a more secure environment for all stakeholders in the network security ecosystem.”
Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors served drinks to attendees at their stands). Enterprise security solutions One eye-catcher was smart wireless security provider Ajax Systems’ stylish black stand Many exhibitors compared IFSEC unfavorably to ISC West in the United States and even to Intersec in Dubai. Others seemed willing to be lured back to Birmingham (previous location for IFSEC) to participate in the upstart competitor, The Security Event, next spring. However, not all the IFSEC 2019 reviews were negative. Vaion made the most of their small stand toward the back of the hall. They experienced brisk traffic right up until the end of the show. Happy with the response, the provider of real-time enterprise security solutions reportedly has already committed to IFSEC 2020. Other exhibitors also made the most of their space at IFSEC; one eye-catcher was smart wireless security provider Ajax Systems’ stylish black stand. Vaion made the most of their small stand toward the back of the hall Latest new products Nedap launched a new product, AEOS 2019.1, that is five time faster and more stable than its predecessor. It uses HTML5 – no more reliance on Adobe. Feedback has been good. The company has also increased its integration of open security standards (OSS). Traka showcased smart lockers, which are modular, scalable, and staff can easily replace broken equipment. Product features can be adapted to specific sectors (i.e., retail, prisons). Traka spends 30% of its revenue on research and development, developing their own engineering. The company has seen massive growth in the UK and Europe. Hanwha Techwin lured visitors into the centre of their stand with drinks and ice cream, surrounded by the latest new products. Hanwha promoted their investment in a manufacturing facility in Vietnam and showcased Wisenet cameras with enhanced 4K images, digital auto tracking, and less motion blur for clearer images. Video verification product A multi-sensor model captures wide areas with a single camera. Hanwha also offered some value-priced cameras that feature easy self-install and are swappable. Optex launched a new product called ‘the Bridge’, a video verification product that bridges CCTV on a digital video recorder (DVR) to intruder alarms. Hanwha showcased Wisenet cameras with enhanced 4K images UK Surveillance Camera Commissioner Tony Porter announced ‘Security By Default’, a set of minimum requirements that will guarantee users that network video security products are as secure as possible in their default settings right out of the box. Hikvision promoted their support for Secure by Default and expressed hopes the initiative would be embraced by other companies and create a new best practice for camera cybersecurity. Hikvision also promoted their retail solution, which includes on-site redaction for GDPR compliance, shelf detection incorporating artificial intelligence, and use of heat mapping to analyze customer foot traffic. Generating revenue Safety and Security Things (SAST), another IFSEC exhibitor, is in the process of creating an ‘app store’ for the security market. Striving to achieve critical mass with participation by a wide range of systems integrators and manufacturers, SAST has a goal of launching to the public in Q1 next year in time for ISC West. Hanwha Techwin is among the players that have already joined the alliance A pilot version will debut this autumn, and they already have 26 apps and six camera manufacturers toward that goal. With a staff of 120, mostly based in Munich, SAST expects to begin generating revenue in 2020 and to grow rapidly. An investment by Bosch is financing start-up operations. Open Security & Safety Alliance (OSSA) is creating standards and a platform to enable the sale of apps in the security market. Large industry players Hanwha Techwin is among the players that have already joined the alliance, and OSSA is seeking to add other large companies, such as Axis, Genetec and Hikvision. Engaging integrators, app developers and software providers as well as camera manufacturers will generate widespread support to ensure the initiative succeeds. Although currently most OSSA members are based in the EU and Asia, it is a global organization open to any company in the world. Many large industry players are now missing from the IFSEC show floor; the most noticeable new abstainer this year was Milestone. And the downturn seems likely to continue: Exhibitors were largely noncommittal about returning next year, although organizers were urging them during the exhibition to sign up for 2020.
In five states in the Western United States, 200 video surveillance cameras keep are keeping watch to provide early warning of wildfires. In the near future, the number of wildfire surveillance cameras will be growing dramatically. Soon there will be more than 1,000 of the cameras in California alone, keeping watch on thousands of acres at risk of destructive events like last year’s deadly Camp and Woolsey wildfires. It is a striking example of how video surveillance technology can be used effectively beyond the realm of corporate or institutional security. The wildfire surveillance cameras are providing extra eyes to avoid a disaster before it can happen. ALERTWildfire surveillance cameras The ALERTWildfire surveillance cameras are installed through a consortium of universities – the University of Nevada, Reno; the University of California San Diego; and the University of Oregon. Dozens of partners also participate in ALERTWildfire, including the National Forest Service, other government agencies, utilities and other private companies, state and local fire departments, and NGOs (non-governmental organizations). Wildfire surveillance cameras can provide early warning when a fire starts and help firefighters respond quicker “It takes a lot of people, pushing in the same direction, to deploy cameras rapidly,” says Graham Kent, University of Nevada, Reno. “We are connected into the community, which is a positive thing.” The wildfire surveillance cameras can provide early warning when a fire starts and help firefighters and first responders scale the resources needed to respond. The cameras also monitor fire behavior until it is contained, enhance situational awareness during evacuations, and ensure fires are monitored appropriately through their demise. Axis Q6055-E PTZ network cameras ALERTWildfire currently uses Axis Q6055-E outdoor-ready pan-tilt-zoom network cameras that provide 1080p HDTV signals, 32x zoom and low-bandwidth compression. (Earlier versions of similar Axis camera models were also installed previously.) The camera’s robust aluminum casing can withstand temperatures up to 140 degrees F, although the cameras are positioned on the tops of towers where temperatures from wildfires are not a factor. In addition to surveillance cameras, each installation site includes a range of equipment including hard power or solar power (on about a third of installations), both with battery backups. Resilient, hardened microwave/fiber networks carry video signals from the cameras to servers at University of Nevada, Reno, which makes them available on the Internet. Geolinks, an ALERTWildfire partner, provides resilient Internet connectivity to mountaintops throughout the West. Firefighters can even watch fires on their mobile devices while they are en route to a fire breakout site Mobile Surveillance Dispatchers around the West have access to video from the cameras, and fire management can move the camera views through their iPhones. Firefighters can even watch fires on their mobile devices while they are en-route to a fire. Cameras are located currently in California, Nevada, Idaho, Washington and Oregon. There have been 85 cameras in place for five years or so, and the number of cameras has more than doubled since the beginning of 2019. The accelerated installation schedule is courtesy of a new policy of using existing infrastructure for cameras rather than creating it from scratch. The large number of cameras on the horizon for California is being funded by utility companies such as Pacific Gas & Electric (PG&E), Southern California Edison and San Diego Gas and Electric. AI in video surveillance The public can view the camera feeds and often call 911 to report early warnings of fires The public can view the camera feeds and often call 911 to report early warnings of fires, thus providing a kind of crowdsourcing, a fire-warning version of “Neighborhood Watch.” In the future, artificial intelligence (AI) could be used to monitor the video feeds to provide early warning. For now, the system is largely used by 911 dispatchers to confirm reports of fires. “Cell phones are so ubiquitous, people call in fires before the AI could react,” says Kent. “We could never beat 911.” A model for early detection of wildfires is in operation in San Diego, where San Diego Gas and Electric manages an emergency center that uses sophisticated real-time modeling to predict fire events based on weather conditions, vegetation, etc., tracked on a threat map. The system enables firefighting resources to be deployed quickly at the first hint of fire and thus to avoid a larger, sweeping wildfire event. Enhancing surveillance for quick wildfires detection “If you can get on top of it quickly enough, it makes all the difference,” says Kent. “In the case of extreme conditions, 10, 20 or 30 minutes can make a big difference.” Other locations are looking to replicate the San Diego model to discover and confirm fires quickly and then reposition assets to respond. Phos-Chek long-term fire retardant, applied by air from a fixed or rotor-wing aircraft, is used to slow or stop the spread of wildland fires. Our successes have led to a demand to get more cameras out right now" Installing more cameras to provide early warning of wildfires is “a grave need in the Western states,” and the system is likely eventually to be deployed in other areas, too. Wildfires can be a challenge in non-Western states such as Florida and Oklahoma, and a similar approach could also be used to provide early warning of other emergencies, such as tornados. “Once we do the West, we will be looking to do the rest of the United States,” says Kent. Increasing demand for video cameras Currently, the biggest challenge is keeping up with demand. “Our successes have led to a demand to get more cameras out right now,” says Kent. “Funding isn’t the largest issue. The money is there to do it, but we have to be able to scale up quickly, working with partners. It’s a wild ride.” Key words for success of the ALERTWildfire system are “location, location, location” combined with “coverage, coverage, coverage,” adds Kent. “We can solve 90 percent of the problem with coverage.”
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
Mobile Access- What You Need To Know (Part 1)Download
- March Networks’ Video Solution Used At Quik-E C-Store To Protect Profits And Recoup Losses
- Rasilient Completes Phase II Of The Video Surveillance System Upgrade At Fairbanks International Airport
- Panasonic’s Facial Recognition Technology Helps Jumbo Ten Brink Food Win The Safest Store Award In The Netherlands
- Hanwha Techwin's Wisenet cameras installed at Beykent University to support medical students’ education