VIVOTEK Video Servers (IP Transmission) / Video Encoders(13)
1 channels, Audio Input, H.264/M-JPEG, IPv4, IPv6, TCP/IP, HTTP, HTTPS, UPnP, RTSP/RTP/RTCP, IGMP, SMTP, FTP, DHCP, NTP, DNS, DDNS, PPPoE, CoS, QoS, SNMP, 802.1X, 10Base-T/100 BaseTX Ethernet (RJ-45), 720 x 480, 30 fps, PTZ, Microsoft Windows XP/Vista/7/2000, Mozilla Firefox 7~10, Google Chrome, Safari (streaming only) Internet Explorer 7.x or 8.x or 9.x, 25 x 34 x 65, 64, 5 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F)Add to Compare
4 channels, Audio Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4, IPv6, TCP/IP, HTTP, HTTPS, UPnP, RTSP/RTP/RTCP, IGMP, SMTP, FTP, DHCP, NTP, DNS, DDNS, PPPoE, CoS, QoS, SNMP and 802.1X, 10/100/1000 Mbps Gigabit Ethernet, RJ-45, 720 x 480, 30 fps, PTZ, Microsoft Windows 2000/XP/Vista/Win7, Internet Explorer 6 or above, 189 x 153 x 49, 800, 24 W, 24 V AC, -10 ~ +50 C (14 ~ 122 F), 20 ~ 80Add to Compare
Vivotek VS3102 high performance VisualServer provides an easy way to distribute synchronizing live images and audio over a network or the Internet to a web browser like Internet Explorer. Suitable for enhancement of web pages with live images and sound, or for network surveillance solutions. Typical applications include tourist web attraction, remote monitoring for diagnostics / industrial verification, surveillance for airport security or crime prevention in public areas. The VS3102 is provided with free monitoring and recording software - ST3101, delivering the functional capability of a professional surveillance system. Key features include: Optimum synchronization of audio & video streams. High quality audio compression engine. H.263 high performance and fully configurable compression engine. Built-in web server. Motion detection with 3 sensitive windows. PPP dial-in and dial-out via external modem. Adjustable network bandwidth. Three transmission options with auto detector.Add to Compare
8 channels, H.264, M-JPEG, MPEG-4, IPv4, IPv6, TCP/IP, HTTP, HTTPS, UPnP*, 10/100/1000 Mbps Gigabit Ethernet, RJ-45, 180 fps, PTZ, Mozilla Firefox, Internet Explorer 6.x or above, 189 x 153 x 49, 837, 24 W, 12 V DC/24 V AC, -10 ~ +50, 20 ~ 80Add to Compare
4 channels, 4, M-JPEG, IPv4, TCP/IP, HTTP, UPnP, IGMP, SMTP, FTP, DHCP*, 10/100 Mbps Ethernet, RJ-45, 704 x 576, 30 fps, PTZ, Mozilla Firefox, Internet Explorer 6.x or above, 160 x 146 x 40, 820, 8 W, 12 V DC, 0 ~ 50, 0 ~ 95Add to Compare
1 channels, H.264, M-JPEG, MPEG-4, IPv4, IPv6, TCP/IP, HTTP, HTTPS, UPnP*, 10/100 Mbps Ethernet, RJ-45, 30 fps, Mozilla Firefox, Internet Explorer 6.x or above, 130 x 78 x 34, 242, 5 W, 12 VDC, 24 VAC, PoE, 0 ~ 55, 20 ~ 80Add to Compare
Browse Video Servers (IP Transmission) / Video Encoders
Video server (IP transmission) products updated recently
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
In today’s technology-driven markets, a platform is a business model that connects producers and consumers in an interactive ecosystem. Some examples of platforms are Uber and Airbnb, which have disrupted and transformed traditional markets. Isn’t it time to deploy the platform model in the physical security industry? That’s the goal of the Open Security & Safety Alliance (OSSA), a non-profit organization. Interactions And Exchange The book ‘Platform Revolution’ defines a platform as ‘a business based on enabling value-creating interactions between external producers and consumers.’ The description continues: ‘The platform provides an open, participatory infrastructure for these interactions and sets governance conditions for them. The platform’s overarching purpose is to consummate matches among users and facilitate the exchange of goods, services, or social currency, thereby enabling value creation for all participants.’ Platform For Security And Safety Solutions OSSA’s plan is to build a common standardized platform for security and safety solutions. Founding members are Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco and VIVOTEK. Anyone can join the alliance, which is growing rapidly and gaining traction as the Internet of Things (IoT) expands. OSSA’s plan is to build a common standardised platform for security and safety solutions OSSA members could be found throughout the recent ISC West show in Las Vegas, and a social event after hours at the show brought them together and set the tone for development to come. A Technology Stack “We want to create an ecosystem, define a common market approach and open new market opportunities,” says Johan Jubbega, OSSA President. “We want to go from a product business to a platform business. It’s better for us and better for the end-users.” OSSA seeks to develop a specification for a common Technology Stack to cater to innovation and reduce fragmentation within the security and safety market, according to OSSA. Its mission is complementary to organizations like ONVIF. Video Information And Low Friction The video surveillance industry creates vast amounts of information in the form of video, but typically less than 1 percent of that data is used by today’s video surveillance systems – think about that one or two frames of video among thousands that might be used to solve a crime, for example. The rest of the data remains unused, and yet the potential value of the data is huge. OSSA seeks to create a platform to leverage the value of the data. “If we don’t unlock that value in our industry, someone will do it for us,” says Jubbega. OSSA is developing a vendor-agnostic operating system that simplifies low-level device integration and standardizes elements such as cybersecurity and security update patches Among the important elements in developing the platform are to create a level of trust among all the stakeholders involved, and to lower the ‘friction’ involved in participating in the platform. “We want to make it easy and fun to do business with anyone who joins the platform,” says Jubbega. “By taking away the friction, we will create scalability.” System-On-Chip Development of customisable system-on-chip (SoC) components in today’s video cameras provide the capacity to host a variety of ‘apps’ to expand system functionality and leverage the value of data. OSSA is developing a vendor-agnostic operating system that simplifies low-level device integration and standardizes elements such as cybersecurity and security update patches. Building on top of that operating system, vendors can create new levels of differentiation. “Our purpose is to start from a common business model to spur innovation and add value for users,” according to OSSA. Cybersecurity And Data Protection SAST is creating the operating system and setting up the IoT infrastructure to make apps available Simply speaking, app developers can use the standard operating system to build new functionalities that can easily be ‘loaded’ on cameras and sold in an ‘app store’ scenario. Security and Safety Things (SAST), a Bosch startup and member of OSSA, is creating the operating system and setting up the IoT infrastructure to make the apps available. Development of these elements is happening concurrently with the evolution of OSSA. “We offer you an opportunity to come with us on this journey,” Jubbega told attendees at the ISC West social event. “We want to have a common approach to tackling cybersecurity and data protection – to raise the bar in the industry. You can still differentiate, but from a higher base.” OSSA members who exhibited at ISC West included Anixter Inc., Bosch Building Technologies, Hanwha Techwin, Milestone Systems, NetApp Inc., Pelco, SAST, Socionext Inc., United Technologies and VIVOTEK Inc.
Parekh Integrated Services Pvt. Ltd (PISPL) is in the business of providing high-quality logistics services that give customers a competitive advantage in the Indian market. Established in 1981, PISPL is a one-stop shop logistics and supply chain service provider in India offering storage and distribution services, freight forwarding, transportation, information technology and cold chain management solutions along with other value added services to multiple industry verticals. Video Surveillance Systems Parekh Integrated Services Pvt. Ltd (PISPL) has established their operation with more than 1,500 warehouses and distribution setups to cover all the major cities in India for their services. With this expansion, IT infrastructure equipment was procured, including IP video surveillance systems of different reputed brands from different vendors. Cost of operation has also gone up due to technical expertise required for each individual system Over a period, it was becoming costly and difficult to manage different brands procured separately at different locations. Cost of operation has also gone up due to technical expertise required for each individual system. PISPL was looking for a centralized solution, which can work with different reputed brands as well as give them a common control of all the video surveillance systems to reduce the technical manpower cost for different systems. Occupancy Control System Due to low bandwidth at some of the remote locations, PISPL were not able to secure video evidence at a central location. It was required for any kind of post analysis or dispute resolution. PISPL were looking for an occupancy control system in each warehouse/storage area to manage and control the worker's presence in sensitive areas. It was getting difficult to do it manually at each location with the increase in number of employees over the last few years. Matrix provided video management software (VMS) as a centralized platform to monitor and manage all the cameras from a central location on a single platform. It worked as a common platform for all the surveillance cameras from different brands, which leads to reduction in operation cost. Matrix VMS supports all the camera models of major brands including ACTI, Samsung, SONY, Mobotix, Panasonic, Vivotek, etc., along with ONVIF protocol. Crowd Management Feature PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location Using Matrix VMS Solution, PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location. This made it easy to go through the video evidence at a central location and resolve the issue in short time. Another issue of maintaining occupancy a certain limit in each zone was addressed by the Matrix VMS crowd management feature. All the entry/exit points were covered with a camera to count number of heads passing through the points. From central control room, using Matrix smart client, security can monitor the total occupancy of an area and instruct the team accordingly. Thus, it provides a common platform to connect multi-brand cameras, secure video evidence at central location and control zonal occupancy, which were the major challenges. Control Zone Occupancy Why did PISPL choose Matrix? Matrix VMS architecture supports centralized / decentralized monitoring and management Matrix VMS interoperable with most of the reputed brands Possibility of scheduled backup at central location even at lower bandwidth People counting feature to control zone occupancy Benefits: Centralized control and management Ease of use Secure evidence Improve productivity Products: SATATYA SAMAS GE PLATFORM - VMS Platform with 50 camera licenses SATATYA SAMAS CAM20 – 20 camera additional licenses SATATYA SAMAS CROWD - 20 camera additional licenses management cam5
VIVOTEK, globally renowned IP surveillance solutions provider, has announced the end-to-end comprehensive protection in its Cybersecurity Management Solution under the strategy of the “Security within Security” campaign. The solution provides a robust shield that starts from the front-end network camera, to the network video recorder, and to the back-end video management software. This solution will be displayed in VIVOTEK’s booth (#12089) at ISC West 2019, taking place from April 10 to 12 at the Sands Expo, Las Vegas, United States. VIVOTEK – Trend Micro Collaboration Built in collaboration with Trend Micro, globally renowned cybersecurity solutions firm, VIVOTEK’s network cameras and video recorders are embedded with Trend Micro’s anti-intrusion software with multi-layer protection, including brute force attack detection, intrusion detection & prevention, and instant damage control. Users can obtain the following cybersecurity management features with the latest firmware update releases, available by the end of April. The advanced management in its self-developed video management software, VAST 2 includes Instant Alert Notifications, allowing users to receive notifications either automatically or manually, and real-time Cyber Risk Dashboard to easily identify common types of cyber-attacks. Last but not the least, users can take a further step to filter attack logs through different criteria, making it quicker to find abnormal events in a large number of records. Cybersecurity Management Solution Shengfu Cheng, Director of VIVOTEK Marketing and Product Development Division, commented, “To address the rising threat to cybersecurity, VIVOTEK puts enterprise power and resources in the hands of Cybersecurity Management Solution. This solution allows users to respond faster to threats and minimize cyber risks in IP video surveillance networks. We will continue working to provide our valued customers with reliable products under cybersecurity protection.”
Mobile Access- What You Need To Know (Part 1)Download
5 Steps To Finding The Right Access Control System For YouDownload
Why Outdated Access Control Systems Are a Big ProblemDownload
- March Networks’ Video Solution Used At Quik-E C-Store To Protect Profits And Recoup Losses
- Rasilient Completes Phase II Of The Video Surveillance System Upgrade At Fairbanks International Airport
- Panasonic’s Facial Recognition Technology Helps Jumbo Ten Brink Food Win The Safest Store Award In The Netherlands
- Hanwha Techwin's Wisenet cameras installed at Beykent University to support medical students’ education