VideoIQ Video Servers (IP Transmission) / Video Encoders(10)
The Rialto Analytic Bridge product line offers an all-in-one video encoder— video analytics and onboard storage— with up to 16 channels. It enables integrators to upgrade or install video surveillance systems with VideoIQ's patented video analytics at a dramatically lower cost per channel. With the Rialto, the most accurate and reliable video surveillance solution on the market is now affordably available to businesses of all sizes. The Rialto A4 offers a 4-channel analog solution that easily integrates with most analog cameras and offers reliable SSD edge storage. It is easy to install and use and also includes VideoIQ ViewÔ VMS software for immediate pro-active monitoring. The Rialto A4 is also a very cost effective way to add remote video monitoring services to your surveillance solution. The A4 is the first in the Rialto Analytic Bridge series. The industry’s most advanced, reliable analytics. VideoIQ’s award-winning adaptive analytics — based on pattern analysis rather than pixel analysis — are continuously self-calibrating and ready to use right out of the box for easy set-up and quick installation. With each object detected they become more accurate, reducing false alarms and ongoing maintenance while allowing security personnel to focus only on events of high interest. The most scalable solution for new and existing systems. Easily upgrade existing analog, thermal and PTZ camera networks with award-winning video analytics. The Rialto is designed to scale from two to multiple cameras, and does not impact bandwidth or network infrastructure, making it a perfect video surveillance choice for remote locations, perimeter security and challenging environments. On-board storage eliminates additional infrastructure. Unlike other video surveillance systems, the Rialto A4 offers either 40 or 160GB of Solid State Drive (SSD) distributed on-board storage. There’s no need to stream video to a central server, which reduces network traffic and bandwidth consumption by over 90%. System-wide notification enables faster response. Our View software has user-configurable, rules-based alerts that trigger automatic notifications to multiple VMS users when a real-time threat is detected. View is free to use and can be ready in 15 minutes. VideoIQ products also seamlessly integrate with most VMS providers.Add to Compare
1 channels, 2, H.264, HTTP, HTTPS, TCP, RTSP, UDP, RTCP, DHCP, NTP, DNS, Ethernet 10/100 BaseT - RJ45 connector, 30 , PTZ, Core-2 Duo 2.0 GHz CPU or higher, 2 GB RAM, Windows XP, Vista, or Windows 7, 193 x 88 x 62, 620, 6 W, 12 V DC, 0 ~ 50, 20 ~ 80, NTSC or PAL via BNC connectorAdd to Compare
VideoIQ™ iCVR™ encoders and Rialto product line provide all the benefits of the VideoIQ iCVR architecture, including reliable and accurate analytics and zero bandwidth recording. iCVR encoders can be used with analog PTZ and thermal cameras, replace a conventional DVR and/or upgrade any analog camera to IP connectivity. Onboard SSD or hybrid storage of up to 750GB eliminates the need for expensive centralised storage and high capacity networks - reducing deployment costs, system complexity, infrastructure, time and resources. In addition, VideoIQ's embedded, award-winning analytics are continuously self-calibrating are ready to use right out of the box for easy set-up and quick installation. These analytics learn from their installed environment and deliver superior and accurate real-time threat detection and forensic evidence and dramatically reduce costly false alarms.Add to Compare
4 channels, 6, MPEG, HTTP, HTTPS, TCP, RTSP, UDP, RTCP, DHCP,NTP, DNS, 6, Ethernet 10/100 BaseT - RJ45 connector, 30 , PTZ, Windows XP, Vista, or Windows 7, 2 GB RAM, Core-2 Duo 2.0 GHz CPU or higher, 210 x 114 x 51, 816, 15 W, 12 V DC, 0 ~ 50, 20 ~ 80, NTSC or PAL via BNC connectorAdd to Compare
Browse Video Servers (IP Transmission) / Video Encoders
Video server (IP transmission) products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
AMAG Technology announces the release of Symmetry CompleteView Video Management System version 4.5 and four new Symmetry PowerProtect NVRs. Earlier this year AMAG announced a deepened partnership with Salient Systems, Inc. where AMAG now offers Salient’s CompleteView VMS, PowerProtect NVRs and TouchView Mobile App video solutions as part of the Symmetry product line. This is the first software upgrade and NVR addition since the initial announcement in March. Symmetry CompleteView 4.5 “Symmetry CompleteView 4.5 delivers advanced capabilities such as dynamic video management tools to support and streamline complex enterprise deployments, yet remains affordable to provide a powerful standalone system for any size organization,” said AMAG Technology, Senior Product Manager-Video, Jim Murray. Symmetry CompleteView VMS 4.5 includes a suite of software tools called Dynamic Video Management. Designed to increase efficiency and enhance the end user’s experience, the suite offers: Dynamic Resolution Scaling - DRS sizes the video stream to match the display size of the viewing client, (monitor, tablet or phone) reducing bandwidth consumption. Dynamic Video Decoding - DVD saves CPU usage by controlling server processing for camera streams based on live viewing or server motion detection settings. Dynamic Frame Throttling - DFT allows the server to monitor camera video queues balancing load and latency without affecting recorded video. Symmetry CompleteView 4.5 also offers a new Web Client that is HTTP/HTTPS capable with native H.264 live and playback support with enhanced viewing features for the ultra-fast display of video feeds. Users can view multiple cameras simultaneously from multiple Symmetry PowerProtect NVRs located throughout the globe via a single web client video matrix. The Web Client also provides cross browser support, including: Internet Explorer, Firefox, Chrome, and Safari; increasing access to the video management software from virtually anywhere on any device. It will also support multiple languages including: English, French, German, Italian, Portuguese and Spanish. Symmetry TouchView Mobile App Symmetry TouchView Mobile app’s new cross platform capability allows users to create configurations in the app and transfer them to the Web Client for use, providing flexible configuration compatibility. Users can export the web client configuration, which could contain saved video server connections, camera layouts, and video matrix window setup and quickly import it into a mobile iOS or Android mobile device. When you combine Dynamic Resolution Scaling with Symmetry TouchView Mobile apps, Symmetry CompleteView delivers the fastest call up of megapixel resolution video over remote internet connections in the industry today. Symmetry CompleteView 4.5 Also Supports: Http/Https capability Fisheye cameras and dewarping feature set Mac devices, including Safari browser Camera based motion detection with Symmetry, Arecont, Axis, Bosch, HikVision, Samsung, Sightlogix and VideoIQ (Avigilon) New Symmetry PowerProtect NVRs Introducing the new Symmetry PowerMicro NVR with ultra-compact chassis. The Symmetry PowerMicro NVR is powered by an Intel Core i3 series CPU with 4GB memory and a 1TB hard drive. It is the smallest form factor in the Symmetry PowerProtect platform line, and is designed to address space constrained deployments. It is perfect for desktop use, mounting under a counter or securing to a video monitor. Symmetry PowerPro-R, Symmetry Power Plus, and Symmetry PowerUltra NVRs, all two unit rack mounts, offer faster performance and more storage capacity at a reduced cost. Each NVR contains 40% - 47% higher storage capacity with up to 66TB of RAID 5 video storage. Quad NICs allow users to isolate office networks from IP camera networks for added security, setup dual NICs in tandem to boost transfer speed or set up multiple IP camera networks. Also, the Symmetry PowerPro-R’s chassis size was decreased from a 4 unit to 2 unit rack mount, increasing efficiency in installation and real-estate. AMAG Technology, a G4S company, delivers access control and video management solutions to companies of all industries and sizes. G4S provides a wide array of products and services to solve any security need.
2014 was a year for eye-popping merger and acquisition (M&A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market – Google, which made not one but two acquisitions this year that could impact the future security market. It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems VMS company (to almost everyone’s surprise). There was major activity on both sides of the Atlantic, impacting a wide range of industry sectors, from video to access control to home security. It was a year for acquisition and reinvention, for mergers and management refocus. And it was the year that Samsung stopped owning Samsung Techwin. Let’s take a look at the Top 10 M&A stories of 2014 … 1. Canon Acquires Milestone When Canon, a fairly small player in the video surveillance market, announced plans for its European subsidiary to buy open systems company Milestone Systems, it sent shock waves through the market. Obviously Canon is signaling its intent to become a larger player in surveillance, but what does the move mean for the long-term viability of Milestone’s open systems approach? Can an open systems company be owned by a camera company and keep its business approach intact? Yes, according to the Milestone announcement: “Canon respects how we built our business with our partners and supports our strategy of providing open platform solutions.” 2. Vanderbilt Acquires Siemens' Security Products Siemens’ Security Products is well known in Europe, including familiar and established brands such as Bewator and Cotag in access control and Alarmcom and Europlex in the intrusion alarm sector. But who is Vanderbilt Industries? It's a fairly new U.S. company created around the acquisition in 2012 of the Schlage Security Management Systems (SMS) access control product line from Ingersoll Rand. The Siemens acquisition makes them instantly a global player. The move expands the global reach of Vanderbilt’s parent company, ACRE Ltd., and greatly enhances its technology capabilities and product portfolio. 3. Avigilon Acquires VideoIQ 2014 began with news that HD surveillance company Avigilon Corp. had agreed to buy video analytics company VideoIQ for cash consideration of $32 million. Avigilon moved quickly to incorporate VideoIQ's technology into its product line, highlighting video analytics (including the Rialto analytics appliances) along with other technologies at ISC West, IFSEC and trade shows throughout the year. Avigilon is positioning its "adaptive" analytics as a way to simplify total system operation, delivering only the information an end user needs rather than a flood of video images. 2014 saw major activity on both sides of the Atlantic, impacting a wide range of industry sectors, from video to access control to home security 4. HID Global Acquires Lumidigm HID Global is an undisputed worldwide leader in secure identity solutions, so it was big news when HID acquired a biometrics company in February. More accustomed to interfacing with biometrics technologies than owning them, HID’s acquisition of Lumidigm reflects a high level of confidence in the company’s multispectral imaging technology, which uses multiple light spectrums and advanced polarisation techniques to extract unique fingerprint characteristics from both the surface and subsurface of the skin. The system can authenticate identities with a high degree of certainty (and even in non-ideal environments where fingers can get dirty or greasy.) 5. Vicon and IQinVision Merge Vicon Industries and IQinVision announced a merger agreement in the spring to create a global provider of integrated solutions to the video security market. Vicon has long been known for designing and producing (mostly proprietary) video security and surveillance systems. IQinVision designs and produces high performance HD megapixel IP cameras. There are high hopes for the combined company, including continuing a camera line branded IQinVision and transitioning to an open systems approach with an emphasis on extracting business information from video streams. 6. Anixter Acquires Tri-Ed It was a milestone for Anixter International, the largest acquisition in the global distributor’s 57-year history. When Anixter bought Tri-Ed for $420 million, the acquiring company emphasized the opportunity to accelerate implementation of IP video and access control by the new Tri-Ed customer base, previously more focused on analog. Tri-Ed, independent distributor of security and low-voltage technology products, sells 110,000 different products to 2,000 active dealers and integrators through 61 branches and two technical sales centers located throughout North America. Anixter is a global distributor of communications and security products, electrical and electronic wire and cable, fasteners and other small components. 7. Google Acquires Nest Labs It makes headlines when Google does anything, and Google’s entry into the home systems market is no different. Therefore, everyone noticed when Google acquired Nest Labs, a designer and manufacturer of sensor-driven, Wi-Fi-enabled, self-learning, programmable thermostats and smoke detectors. Many observers saw the $3.2 billion transaction as providing a critical foothold into the home systems market. Announced in January and closed the following month, the acquisition set the stage for another acquisition that would serve as further evidence of Google’s intent to be a dominant player in the home systems market ... The big deals of 2014 included some of the largest names in the industry 8. Nest Labs Acquires Dropcam Google-owned Nest Labs, Inc announced that it had entered into an agreement to buy Dropcam for $555 million in cash, subject to adjustments. DropCam provides do-it-yourself IP video cameras for the home environment – and another foothold for Google. 9. Kaba Holding Acquires Keyscan Emblematic of the continuing consolidation in the access control market was acquisition of Keyscan Inc., a Canadian provider of networked access control solutions, by Kaba Holding AG, based in Switzerland. The Keyscan brand presence will be maintained, operating as a separate division of Kaba’s ADS Americas Group. 10. Hanhwa To Buy Largest Interest in Samsung Techwin When Samsung sells its interest in Samsung Techwin, it’s bound to be news, even as the company’s management insists everything is business as usual. It was just a stock transaction (they say), and Samsung Techwin (which was always separate from the larger Samsung Electronics) will continue on its successful course in the video surveillance market. Korean conglomerate Hanwha Holdings announced in late November its 32.4 percent ownership in the video surveillance company (as part of a larger sale of Samsung Techwin’s defense and chemical affiliates). What about the Samsung name? Management assures the market the valuable and well-known brand will remain intact. See the full coverage of 2014/2015 Review and Forecast articles here
“A wealth of information creates a poverty of attention.” So said Herbert A. Simon, American Political Scientist, Economist, Sociologist, Psychologist, and Professor. I heard that quote at the Avigilon presentation at IFSEC, repeated by Ian Povey, Avigilon’s director of product marketing and product management. He used the quote to support the need for more (accurate) video analytics. In other words, without analytics, there is so much video information that the operator’s attention is lost within minutes, so an end user’s whole security stature breaks down. It certainly relates well to video analytics, but what a great quote for so many things in our modern world! Aren’t we all flooded every day with more information than we can ever process? In the security market, there are more cameras than ever, more alarms, more data points, more security threats, more, more, more. No surprise therefore that we turn to companies like Avigilon to help us out. Their presentation at IFSEC told how they do just that. In addition to new video analytics capabilities (a consequence of their acquisition of Video IQ earlier this year), Avigilon also promoted the idea of an end-to-end system that can help security end users deal with the “wealth of information.” The fast-growing manufacturer touted new, closer integration between their new Access Control Manager (ACM) product, which they embraced (and then rebranded) with their acquisition in 2013 of Red Cloud Security. The browser-based system, available in Enterprise, Virtual or new Professional versions, now allows access control alarms to be associated with video and managed either within the ACM system or inside the Avigilon Control Center video software. How alarms are managed is completely configurable and customizable between the two systems. In addition to greater functionality, Steven Lewis, Avigilon’s ACM senior product manager, also offered an economic argument for use of an end-to-end solution from one manufacturer: “Since it’s all our products, we don’t charge extra to bring them together. Many manufacturers have a fee associated with connecting with another manufacturer’s system, whether it’s access to video or video to access. When you use our products, there isn’t any additional fee for integration. It’s even less expensive and works better than those other integrations are ever going to.” About functionality, he continues: “You can choose how you respond to events. The reality is we have hours and hours and hours of boredom punctuated by moments of sheer terror. Something happens, what do I do? You need there to be a process that you know what to do. You don’t have to think. It pops up and tells you, it gives you the data, it gives you the instructions, and then you respond to that. When something happens, then people respond and they’re not trying to figure out what they’re supposed to do.” That’s a good way to get anyone’s attention.
A Blind Spot In Governance, Risk And ComplianceDownload
H.265 High Efficiency Coding: Video Compression For Security ApplicationsDownload
How To Overcome The Storage Challenges Of Adopting Surveillance AIDownload
- Airbus’ STYRIS, Vessel Traffic Services Upgrades The Port Of Sydney
- March Networks’ Video Solution Used At Quik-E C-Store To Protect Profits And Recoup Losses
- Rasilient Completes Phase II Of The Video Surveillance System Upgrade At Fairbanks International Airport
- Panasonic’s Facial Recognition Technology Helps Jumbo Ten Brink Food Win The Safest Store Award In The Netherlands