Bosch Video Servers (IP Transmission) / Video Encoders(27)
Bosch Security Systems’ new VIP X series of IP network MPEG-4 video encoders and decoder offer 4CIF real-time video using less than half the bandwidth and storage space of earlier models. At a maximum frame rate of 30 frames/s, the series’ high-resolution real-time MPEG-4 compressed video offers virtually the same quality as the more space-hungry MPEG-2 compression. The Flexible MPEG-4 compression algorithm also gives users the choice of different frame rates, ranging from 1 up to the maximum of 30 frames/s, to optimize bandwidth and storage space. The VIP X encoders offer dual-streaming capability which enables them to provide two parallel digital video streams encoded with different video quality settings. The VIP X1 offers full-motion video for a single camera, while the VIP X2 works with two cameras and offers greater convenience, cost-savings and ease of installation than a separate encoder for each camera. Both encoders also feature fully-interlaced video, alarm inputs and relay outputs, and pan/tilt/zoom control.The new high-performance Single/Quad Stream VIP XD decoder allows video to be received and displayed on analog or computer VGA monitors. The cost-effective design features a robust MPEG-4 engine to convert high-quality 4CIF resolution digital-video streams at up to 30 frames/s into analog video for viewing. The decoder can decode up to 4 streams at once, delivering a quad view on the operator’s monitor. The VIP XD is definitely the most powerful decoder in Bosch’s family of IP products and is compatible with all VIP and VideoJet encoders. These products are ideal for a wide range of security applications where the highest quality video is needed, bandwidth is limited and storage needs to be saved. Reduced data storage and system costs Seamless integration with existing analog systems Highest resolution video for half the storage (compared with MPEG-2) Single/Quad stream decodingAdd to Compare
16 channels, Audio Input, Alarm Input, H.264/M-JPEG, IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP/ RTCP, IGMP V2/V3, ICMP, ICMPv6, RTSP, FTP, Telnet, ARP, DHCP, NTP (SNTP), SNMP (V1, MIB-II), 802.1x, DNS, DNSv6, DDNS (DynDNS.org, selfHOST.de, noip.com), SMTP, iSCSI, UPnP (SSDP), DiffServ (QoS), LLDP, SOAP, Dropbo, 10/100/1000 Base-T, auto sensing, half/full duplex, RJ45, 704 x 576 p, 30, 44 x 483 x 157, 1,700, 23 W, 100 ~ 240 V AC, 0 ~ 50 C (32 ~ 122 F), 0 ~ 95Add to Compare
2 channels, Alarm Input, H.264, IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP/ RTCP, IGMP V2/V3, ICMP, ICMPv6, RTSP, FTP, Telnet, ARP, DHCP, NTP (SNTP), SNMP (V1, MIB-II), 802.1x, DNS, DNSv6, DDNS (DynDNS.org, selfHOST.de, noip.com), SMTP, iSCSI, UPnP (SSDP), DiffServ (QoS), LLDP, SOAP, Dropbo, 10/100 Base-T, auto-sensing, half/full duplex, RJ45, 704 x 576 p, 30, 38 x 146 x 183, 600, 9 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 0 ~ 90Add to Compare
Audio Input, Alarm Input, H.264/M-JPEG, IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP/ RTCP, IGMP V2/V3, ICMP, ICMPv6, RTSP, Telnet, ARP, DHCP, NTP (SNTP), SNMP (V1, MIB-II), 802.1x, DNS, DNSv6, DDNS (DynDNS.org, selfHOST.de, noip.com), SMTP, iSCSI, UPnP (SSDP), DiffServ (QoS), LLDP, SOAP, digest auth, 10/100 Base-T, auto-sensing, half/full duplex, RJ45, 60, 38 x 146 x 183, 600, 9 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 0 ~ 90Add to Compare
Alarm Input, H.264/M-JPEG, IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP/ RTCP, IGMP V2/V3, ICMP, ICMPv6, RTSP, FTP, Telnet, ARP, DHCP, NTP (SNTP), SNMP (V1, MIB-II), 802.1x, DNS, DNSv6, DDNS (DynDNS.org, selfHOST.de, noip.com), SMTP, iSCSI, UPnP (SSDP), DiffServ (QoS), LLDP, SOAP, Dropbo, 10/100 Base-T, auto-sensing, half/full duplex, RJ45, 1080p, 30, 38 x 146 x 183, 600, 9 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 0 ~ 90Add to Compare
Multichannel encoders plus new decoder module capable of decoding MPEG-4 and MPEG-2 video streams Second-generation VIP X1600 XF base unit with conventional and fibre network capabilities Bosch Security Systems has added important enhancements to its VIP X1600 video-over-IP series which as well as video encoding functionality now also provides video decoding functionality. In the VIP X1600 XF series, Bosch has introduced a new switch platform in the rack-mount base unit that accommodates multichannel video and audio encoder modules as well as the new VIP X1600 XFMD decoder modules. Bosch has also introduced several other enhancements in the VIP X1600 XF base unit. The two 1 Gbps Ethernet ports on the front of the base unit, originally included to provide network port redundancy, are now supplemented by an additional 1 Gbps Ethernet port on the rear. This provides a greater choice of network connectivity and allows for easier inside-rack cabling like, for example, direct connection to an iSCSI storage array (Internet Small Computer System Interface). The new base unit also features a 1 Gbps small form factor pluggable (SFP) optical transceiver slot on the front to enable direct fibre connection to a remote Storage Area Network. As with the original series, the VIP X1600 XF base unit can accommodate up to four encoder modules, with each four analog video inputs or combined analog video/audio inputs and redundant power supply. Additionally, the VIP X1600 XF base unit can accommodate up to four of the new VIP X1600 XFMD multichannel decoder modules featuring four analog video outputs plus bi-directional audio. Encoder and decoder modules can be mixed and matched within the base unit and the modules are also "hot swappable", allowing modules to be added or exchanged at any time without interrupting transmission to the existing channels. Featuring four analog BNC video outputs with bi-directional audio, the VIP X1600 XFMD decoder module is capable of decoding up to four MPEG-2 video streams without audio or up to 10 MPEG-4 video streams each at a maximum resolution of 4CIF@25/30 ips. The decoder can also be set up to display 4 full screen video signals or 2 full screen and 2 quad views. This allows the 10 MPEG-4 live video streams from a single decoder to be displayed on a compact monitor wall. If 4 decoder modules are used, the system can serve a monitor wall of up to 16 analog monitors displaying the live video from up to 40 cameras. Changing the setup and camera selection in small installations is easy with the decoder's highly intuitive web-based user interface (which can be accessed via a video management system). The system administrator can set up a network scan to identify all cameras on the network, then assign the output of each camera to a specific analog monitor using either on-screen selection buttons or a drag & drop function. The interface also features an on-screen auto connect switch that allows the system configuration to be stored and automatically re-established in the event of a power cut to the system or in the event of any network failure.Add to Compare
4 channels, MPEG-4, M-JPEG, JPEG, RTP, Telnet, UDP, TCP, IP, HTTP, HTTPS, FTP, DHCP, 10/100 Base-T, auto-sensing, half/full duplex, RJ4, 30 fps, 33 x 142 x 178, 600, 11 VA, 10 ~ 30 V DC, 0 ~ +50, 20 ~ 80Add to Compare
The Bosch VIP-X1XF Main Profile encoder delivers real-time H.264 compressed video over IP. Delivering two independent streams per camera, each stream delivers full frame rate at best quality and are adjustable to allow viewing and recording at different quality levels. Equipped with a hardware accelerator for Bosch IVA functions, VIP-X1XF takes Intelligence-at-the-Edge to the next level. Same bandwidth, twice the resolutionThe implementation of main profile encoding gives users the benefit of DVD image quality video (4CIF) at the same bandwidth as MPEG-4 half resolution video (2CIF)*. Furthermore Bosch's low latency implementation of this main profile technology offers all the compression benefits of live video without sacrificing image quality, for top-of-the-line H.264 implementation.Designed for IVADesigned for intelligence from the ground up, VIP-X1XF brings you virtually unlimited performance for best quality video at 25/30 images per second@4CIF and full Intelligent Video Analytics. Adding VIP-X1XF, complete with optional IVA licence, to your existing analog cameras transforms them into powerful, automated detectors that help operators to stay focused. The encoder brings a new level of automation to your CCTV monitoring. Edge-based, real-time processing instantly identifies and warns security teams of alert conditions, giving them the information they need to act quickly.SD card and iSCI recordingRecord two video streams independently on different media. Video can be recorded centrally on iSCI drives managed by Bosch VRM (Video Recording Manager) and redundantly on local media. If networks fail, Bosch VRM fills in gaps in the central recording via automatic network replenishment (ANR).Bilinx supportWith built-in Bilinx support, VIP-X1XF ensures optimum investment protection when migrating to IP. Existing cameras can stay in place, remote configuration functions and PTZ controls keep working without extra cabling, simply connect the coax to the encoder and its done.BenefitsUltra compact size for easy installation close to the cameraH.264 Main Profile encoding for double the resolution with the same bandwidth requirement*Two independent IP video streams per channel allow viewing and recording at two different quality levels ONVIF compliant, compatibility between manufacturers provides customers with open systemsDesigned for IVA, transforms your analog cameras into powerful automated detectorsCompatible with Bosch Forensic Search which allows you to scan hours of video in just secondsSet adjustable privacy masks, a major benefit for urban surveillance applicationsDirect to iSCI recording and Bosch VRM support eliminates the need for NVR's, significantly reducing cost of ownershipBosch ANR support enables video recording even during network outages * In comparison to MPEG-4, depending on scene and quality settingsAdd to Compare
16 channels, IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP, IGMP V2/V3, ICMP, RTSP, FTP, Telnet, ARP, DHCP, SNTP, SNMP (V1, MIB?II), 802.1x, SMTP, iSCSI, UPnP (SSDP), RSTP, 10/100/1000 Base?T, auto sensing, half/full duplex, RJ45, 35 x 118 x 52, 400, 100 ~ 240 V AC, 0 ~ 50 C (32 ~ 122 F), 0 ~ 95Add to Compare
4 channels, Audio Input, Alarm Input, H.264, IPv4, IPv6, UDP, TCP, HTTP, HTTPS, RTP/ RTCP, IGMP V2/V3, ICMP, ICMPv6, RTSP, FTP, Telnet, ARP, DHCP, SNTP, SNMP (V1, MIB-II), 802.1x, DNS, DNSv6, DDNS (DynDNS.org, selfHOST.de, noip. com), SMTP, iSCSI, UPnP (SSDP), DiffServ (QoS), LLDP, SOAP, Dropbox, CH, 10/100 Base?T, auto-sensing, half/full duplex, RJ45, 38 x 146 x 183, 600, 9 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 0 ~ 90Add to Compare
4 channels, 4, H.264, MPEG-4, MJPEG, RTP, Telnet, UDP, TCP, IP, HTTP, HTTPS, FTP, DHCP, 10/100 Base-T, auto-sensing, half/full duplex, RJ4, 30 fps, 33 x 142 x 178, 600, 19 VA, 10 ~ 30 V DC, 0 ~ 50, 20 ~ 80, Analog composite, 0.7 to 1.2 Vpp, NTSC or PALAdd to Compare
4 channels, 4, H.264, MPEG-4, MJPEG, RTP, Telnet, UDP, TCP, IP, HTTP, HTTPS, FTP, DHCP, 10/100 Base-T, auto-sensing, half/full duplex, RJ4, 30 fps, 33 x 142 x 178, 600, 19 VA, 10 ~ 30 V DC, 0 ~ 50, 20 ~ 80, Analog composite, 0.7 to 1.2 Vpp, NTSC or PALAdd to Compare
Browse Video Servers (IP Transmission) / Video Encoders
Video server (IP transmission) products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
The coronavirus (COVID-19) pandemic marks the biggest global disruption since World War II. While the ‘new normal’ after the crisis is still taking shape, consumers are apprehensive about the future. According to a recent survey, 60% of shoppers are afraid of going grocery shopping, with 73% making fewer trips to physical stores. Returning to the workplace is also causing unease, as 66% of employees report feeling uncomfortable about returning to work after COVID-19. Businesses and employers are doing their best to alleviate these fears and create safe environments in and around their buildings. This also comes at tremendous costs for new safety measures and technologies – including updates to sanitation protocols and interior architecture – that protect against COVID-19. Costs in the billions that most businesses will face alone, without support from insurance and amidst larger, macroeconomic challenges. Saving costs and increasing security But what if building operators, retail shop owners, and other stakeholders could save costs by leveraging new functionality from their existing security infrastructure? More specifically, expanding the use of current-generation security cameras – equipped with AI-driven image analysis capabilities – beyond the realm of security and into meeting new health regulations. This is exactly where video analytics algorithms come into play. And in the next step, a new evolutionary approach towards open security camera platforms promises new opportunities. Security cameras have evolved from mere image capturing devices into complex data sensors Over the past decade, security cameras have evolved from mere image capturing devices into complex data sensors. They provide valuable data that can be analyzed and used in beneficial ways that are becoming the norm. Since 2016, Bosch has offered built-in Video Analytics as standard on all its IP cameras. On one hand, this enables automated detection of security threats more reliably than human operators. And on the other hand, video analytics collect rich metadata to help businesses improve safety, increase efficiency, reduce costs, and create new value beyond security. Expanding Camera Functionality Beyond Security Today, we have ‘smart’ security cameras with built-in video analytics to automatically warn operators of intruders, suspicious objects and dangerous behaviors. The rich metadata from several cameras on the same network can also be consolidated by making use of an intelligent software solution. It offers so-called pre-defined widgets to provide business intelligence by measuring area fill levels, counting building occupancy and detecting the formation of crowds. In combination with live video stream data, these insights enable heightened situational awareness to security operators. What’s more, operators are free to set their own parameters – like maximum number of occupants in a space and ‘off limit’ areas – to suit their needs. These user-centric widgets also come in handy in dealing with the coronavirus pandemic. Specific widgets can trigger an alarm, public announcement or trigger a 'traffic light' when the maximum number of people in a space is exceeded. Building operators can also use available intelligence such as foot traffic ‘heat maps’ to identify problem areas that tend to become congested and place hand sanitizer stations at heavily frequented hotspots. At the same time, the option to perform remote maintenance on these systems limits the exposure of technicians in the field during the pandemic. Again, the underlying camera hardware and software already exist. Cameras will be able to ‘learn’ future functionality to curb the spread of the coronavirus Looking ahead, cameras with video analytic and neural network-based analytic capabilities will be able to ‘learn’ future functionality to curb the spread of the coronavirus. For instance, cameras could monitor distances between individuals and trigger voice announcements when social distancing guidelines are violated. Facial recognition software can be trained to monitor personal protective equipment (PPE) compliance and sound alerts for persons entering buildings without masks. The technical requirements are already in place. The task at hand is to deliver these new functionalities to cameras at scale, which is where open camera platforms hold the key. Why Open Camera Operating Systems? When it comes to innovating future camera applications that extend beyond security, no hardware manufacturer should go at it alone. Instead, an open platform approach provides the environment for third-party developers to innovate and market new functions. In essence, an open platform principle allows customers and users to change the behavior of devices by adding software afterwards. This software can either be found in an app store or can be self-developed. For a precedent, we can look at the mobile phone industry. This is where software ecosystems like Android and Apple’s iOS have become the norm. They have also become major marketplaces, with the Apple App Store generating $519 billion in billings on 2019, as users use their phones for far more than just making phone calls. In the same way, intelligent cameras will be used far beyond classic video applications in the future. To get there, adopting an open platform principle is essential for a genuine transformation on an industry level. But establishing an open platform principle in the fragmented video security industry demands a cooperative approach. In 2018 Bosch started a fully owned start-up company, Security & Safety Things, and became one of five founding members of OSSA (Open Security & Safety Alliance). With more than 40 members, the Alliance has collectively created the first Technology Stack for “open” video security devices. This includes the OSSA Application Interface Specification and Compliant Device Definition Specification. An open camera platform for innovating future functionality Based on OSSA’s common APIs, collective approach on data security and core system requirements for video security cameras, the first camera manufacturers were able to build video security cameras that adopt an open platform principle. Further fueling innovation, OSSA focused on driving the creation of one centralized marketplace to unite demand and supply in the market. Camera devices that are built in accordance with OSSA’s Technology Stack, so-called “Driven by OSSA” devices, can benefit from this marketplace which consists of three pillars: a development environment, an application store, and a device management portal. Security & Safety Things has advanced OSSA’s open camera platform concept, built this marketplace for the security and safety industry and has developed the open OS that powers the first “Driven by OSSA” devices. Making it quick and simple to customize security solutions by installing and executing multiple apps This year, Bosch, as one of the first camera manufacturers, introduces the new INTEOX generation of open platform cameras. To innovate a future beyond security functionality, INTEOX combines built-in Intelligent Video Analytics from Bosch, an open Operating System (OS), and the ability to securely add software apps as needed. Thanks to the fully open principle, system integrators are free to add apps available in the application store, making it quick and simple to customize security solutions by installing and executing multiple apps on the INTEOX platform. In turn, app developers can now focus on leveraging the intelligence and valuable data collected by analytics-equipped cameras for their own software developments to introduce new exciting possibilities of applying cameras. These possibilities are needed as smart buildings and IoT-connected technology platforms continue to evolve. And they will provide new answers to dealing with COVID-19. The aforementioned detection of face masks and PPE via facial detection algorithms is just one of manifold scenarios in which new apps could provide valuable functionality. Contact tracing is another field where a combination of access control and video analytics with rich metadata can make all the difference. Overall, open camera platforms open a future where new, complex functionality that can save lives, ensure business continuity and open new business opportunities will arrive via something as simple as a software update. And this is just the beginning.
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient design includes a Master Access Controller (MAC) as an additional layer of defense between the server and the access controllers. If the server fails, the MAC takes over, ensuring continuous communication across controllers while sharing necessary information from the card readers. In addition, access control functionalities that involve multiple access readers, such as anti-passback and guard tour can continue to perform. The anti-passback functionality is an important feature to ensure a high level of security. It prevents a cardholder from passing a card to another person enabling an unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route at specified times. Threat level management The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked Any deviation of sequence or timing causes an alarm in the Access Management System. Immediate notifications to colleagues or first responders increase the safety of security guards. In the rare event that both the Access Management System 3.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers (AMCs). Thanks to this offline capability, it is possible to save millions of events even during downtimes, ensuring the continuous availability of the system. Access Management System 3.0 offers up to 15 configurable threat levels such as lockdown, controlled lockdown, or evacuation, which means safety measures can be initiated quickly in critical situations such as fire or security breach. The threat level state is activated by one of three triggers: operator workstation, external contact such as an emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked. Scalable and future-proof Users can start small and add extra capacity whenever necessary. The Access Management System 3.0 software can be expanded up to 10,000 doors and 200,000 cardholders. The software is offered in three pre-configured software bundles from medium to large organizations: Lite (max. 144 doors), Plus (max. 512 doors), and Professional (max. 10,000 doors). All bundles support up to 200,000 cardholders. No hardware needs replacing when expanding; users only require software upgrades and possibly additional controllers, readers, and cards. So, increasing the system is also cost-efficient. Customers who work with the software solution Access Professional Edition (APE) from Bosch can migrate to the Access Management System 3.0 by using the new importer/exporter tool. Together with regular updates to data security enhancements, these features make the system a future-proof investment - suitable for office and government buildings, retail environments, educational institutions, and more. Easy configuration and operation Access Management System 3.0 also has trusted digital certificates for mutual authentication Configuration is easy: Users can import existing floor maps into the system, and drag and drop icons on the map to represent controllers, doors, and building objects. User onboarding is straightforward. For example, enrollment and assignment of access profiles are all implemented in one dialog manager. Operation is smooth: The graphical user interface (GUI) is simple and easy to understand. The dark color scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. Access Management System 3.0 offers protection against cybercrime and loss of personal data. The database, as well as the communication between the server and access controllers, is encrypted at all stages through the support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 3.0 also has trusted digital certificates for mutual authentication between the server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege.” Integration with third-party solutions Access Management System 3.0 is ideal as a standalone solution to meet today’s access control needs. It integrates seamlessly with Bosch B Series and G Series intrusion control panels as well as with video systems such as Bosch Video Management System or third-party systems like Milestone’s XProtect for increased security and enhanced situational awareness. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly Integration with Bosch Video Management System (version 10.1 and higher) offers manual video verification to increase the security level at doors. The operator can visually verify whether the person at the door matches the registered person in the database. If so, the operator allows the person to enter. Bosch Video Management System integration also enables searching for cardholder events and events at doors. With the searching functionality, it is possible to quickly check who has entered an area and at what time. Moreover, access commands and events can be handled in Bosch Video Management System, making the operation of the integrated system most efficient. Intrusion control panels integration B and G Series intrusion control panels integrate seamlessly into Access Management System 3.0 for efficient authorization management and a central overview of all access and intrusion events. With central user management, operators can add, delete, and modify intrusion-related user passcodes and authorizations directly into the system, as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly in the Access Management System 3.0 user interface as well as to see states of the areas (e.g. “armed”, “ready to arm”) and detectors (e.g. “motion detected”) on the system map. This provides operators with a central overview of all access and intrusion states, allowing them to easily and remotely handle intrusion events. Bosch Access Management System 3.0 is available for sale and makes access management simple, scalable, and always available.
The Open Security & Safety Alliance (OSSA), an industry body comprised of influencers and innovative organizations from all facets of the security, safety and building automation space, announced a series of milestones achieved in the past 20 months since the Alliance opened its doors. Significant markers include the OSSA common Technology Stack and two resulting specifications, the introduction of the first OSSA-inspired digital marketplace, and the newly unveiled “Driven by OSSA” designation for the first commercially available video security devices based on the Alliance philosophy and purpose. These accomplishments roll up into the organization’s overall vision of ‘one global approach to fuel the creation of new value within the security and safety space.’ Consistency across video security devices The OSSA-orchestrated ecosystem is designed to enhance trust, and to enable innovation and opportunity for industry stakeholders and customers. The initiative is anchored by OSSA’s first Technology Stack, which describes the fundamental thoughts on how to create harmony across video security devices to enhance trust and enable innovation. Under the umbrella of this guiding document, and further solidifying it, the Alliance is now launching the first two in a series of technical specifications, being: OSSA Application Interface Specification This technical specification (available to OSSA members only) defines a set of four interfaces which collectively enable third-party software applications to run on video security cameras following the Technology Stack. The input stream describes the video frames and messages the applications can subscribe to. The web API describes how applications can make use of the camera’s webserver to support, configuration and data upload to the application. The system APIs provide system information regarding OS version, capabilities and information about the video security camera. This is needed to understand the features and APIs that are available on the cameras to make use of device-specific functionality. The streaming application model allows applications to interact with each other. Apps can share their results, such as events and scene descriptions, with other apps on the device or (video management) software in the network. OSSA Compliant Device Definition Specification This technical specification sets the core system requirements for video security cameras following the OSSA Technology Stack to provide a basis of trust and for app interoperability across vendors. This spec is publicly available. The First “Driven by OSSA” Commercial Cameras Camera manufacturers have started to introduce to the market, devices designed to reduce fragmentation and orchestrate harmony within an open ecosystem for the surveillance industry. The first manufacturers to launch cameras based on OSSA’s Technology Stack include Topview/Qisda, Ability/AndroVideo, Bosch (through their INTEOX camera line), VIVOTEK and Hanwha Techwin. The first commercially available products based on the specifications set forth by the Alliance, OSSA will receive a signage mark for video security cameras. Companies that use this “Driven by OSSA” signage: Are full OSSA members; have signed the OSSA by-laws guiding amongst other things minimum requirements regarding data security and privacy protection. Follow the OSSA Technology Stack for video security devices that prescribes the use of an open operating system (OS). Security & Safety Things, an OSSA member company, developed the open OS and made it available to OSSA members. Ensure seamless connectivity within one centralized digital marketplace. Offer the ability to install and execute third-party apps on their cameras. One Centralised Digital Marketplace OSSA is driving the creation of one centralized marketplace to unite demand and supply in the market. Camera devices that are built in accordance with OSSA’s Technology Stack, so-called “Driven by OSSA” devices, can benefit from this marketplace which consists of (1) a development environment (2) an application store and (3) a device management portal. System integrators, using the application store, can deploy available apps across devices, in a brand independent manner, to meet specific customer requirements. App developers will find in the development environment comprehensive tools, documentation and libraries to develop new software applications. These new apps can then be offered for sale through the application store. “This is an exciting time for security and safety professionals as the main industry players pivot together in a new direction based on digital connections afforded by the IoT,” said Johan Jubbega, President, Open Security & Safety Alliance. “In these current times of global change and uncertainty, it’s of vital importance that we persist in our quest for new market opportunities and current market efficiencies, and we’re proud to be facilitating this movement that is shaping the future of the security and safety systems environment.”
Related white papers
Reducing The Cost of Video Surveillance System Deployment and Operation
Five Things To Consider For AI With Video Technology
Making Your Surveillance Cyber Secure
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload
Dahua Technology’s Safe City Solution Chosen By The Local Government To Make Brienon-sur-Armançon Safer
- United Kingdom Supreme Court Gets Equipped With Panasonic PTZ Cameras For Transparency And Live Streaming
- Dahua Technology’s Safe City Solution Chosen By The Local Government To Make Brienon-sur-Armançon Safer
- Airbus’ STYRIS, Vessel Traffic Services Upgrades The Port Of Sydney
- March Networks’ Video Solution Used At Quik-E C-Store To Protect Profits And Recoup Losses