Verint Video Servers (IP Transmission) / Video Encoders(27)
1 channels, Audio Input, Alarm Input, 1, H.264/MPEG-4, RTP/IP, UDP/IP, TCP/IP, RTSP, or multicast IP, DNS, NTP, SNMP v1/v2c/v3 (MIB-II), HTTP, HTTPS, DHCP client, 802.1x, RJ-45, Ethernet 10/100 Base-T, 1920 x 1080, 30 fps, 106 x 90 x 42, 260, 4 W, 12 V DC, 0 ~ 60 C (32 ~ 140 F), 95, HDMI with an output format of up to 1080i (1920x1080@30fps)Add to Compare
Verint is advancing the capture and management of digital video for high-capacity users with Verint’s Video Management Software and its suite of Ethernet Video Servers. Based on open, industry standards, Verint Nextiva MPEG-4-based Video Solutions enable organizations to acquire, manage and use video as easily as any other data. Users can develop high-performance, fault tolerant video transmission and storage infrastructures, which deliver secure and rapid video access across IT networks.The Verint Nextiva S1712e 12-Input Ethernet Video Server provides a cost-effective, multi-port solution especially for video monitoring and surveillance in areas where a high concentration of cameras terminates within the same area. Verint Nextiva S1712 delivers MPEG-4-based video over 10/100 Base-T networks using cat 5, fibre optic and wireless media. Vast amounts of video can be collected, transmitted, stored and accessed from virtually anywhere. With Verint’s Video Management Software, you can view your live and recorded video and manage your entire video surveillance operation from a single LAN- or WAN-enabled workstation, or via a Web browser, anytime and from anywhere.Verint’s highly-scalable, cost-effective open solutions also leverage your investment in open industry standard storage solutions such as IBM servers and RAID. Develop effective strategies for management and retention of video surveillance data using Verint’s Networked Video Solutions, and the most vital images within the vast amount of video you capture can be accessed from virtually anywhere on your IT network by the people who need them most.Add to Compare
Verint has launched 3 new DVD-quality Ethernet Video Servers. These compact servers are easy to configure and manage and utilize Nextiva Control Centre, an easy-to use management portal which simplifies deployment and enables configuration and administration from a single location and application.Nextiva S1704e: Including on-board analytics, this unit is designed for video monitoring and surveillance over IP networks and integrated with the Nextiva platform and applications. Analytics ‘at the edge' can dramatically reduce video transport and storage requirements.Nextiva S1950e: A single port, high-resolution encoder designed for digital video monitoring and surveillance over IP networks. Built for ease of use, up to 5 authorized users can simultaneously monitor live video and configure other unit settings using Internet Explorer and a secure and intuitive Web browser interface.Nextiva 1970e: Delivers 4CIF, 25 FPS for single-camera applications requiring optimal image quality. With MPEG-4 SP video compression, dynamic bandwidth allocation and dual streaming capabilities, the Nextiva S1970e helps optimize the use of valuable network resources.Built on accepted industry standards for easy interoperability with existing IT infrastructure and video equipment, the new Nextiva Ethernet Video Servers represent a comprehensive suite of solutions designed to deliver superior functionality, long-term investment protection, and value. IIPSEC stand 089Add to Compare
16 channels, Alarm Input, H.264/MPEG-4, RTP/IP, UDP/IP, TCP/IP, RSTP, or multicast IP, DNS, NTP, SNMP v1/v2c/v3 (MIB-II), HTTP, HTTPS, DHCP client, and 802.1x, RJ-45, Ethernet 10/100/1000 Base-T, 720 x 576, 15 fps, 30Kbps ~ 6Mbps, Embedded Linux, 430 x 168 x 43, 1,800, 12 V DC, 23 W, 0 ~ 55 C (32 ~ 131 F), 95, 16 composites, 1 Vpp into 75 ohms NTSC/PAL, BNC femaleAdd to Compare
Verint® Systems Inc., a leading global provider of analytics software-based solutions for workforce-enterprise optimisation and security, today announced additions to its family of multiport encoders, along with the next release of its patent-protected Nextiva® Enterprise video management software. These integrated solutions are the latest enhancements to the industry-leading Nextiva IP video portfolio from Verint® Video Intelligence Solutions™, and are designed to deliver a flexible and scalable IP video management platform to organizations around the world. Robust and energy-efficient next-generation multiport encoders. The introduction of its environmentally-friendly Nextiva S1808e and S1816e multiport encoders represent the latest addition to the Nextiva portfolio, and are the result the company's decade-long track record that includes deploying close to one million multiport encoder inputs. The Nextiva S1808e and S1816e multiport encoders are enterprise-class solutions designed to deliver high-resolution images for recorded and live video, and support H.264 and MPEG-4 video up to 4CIF/30fps on all ports. By incorporating the robust H.264 video encoding technology, the solutions can help enable lower total cost of ownership (TCO), decreased bit rate and storage consumption by up to 50 percent, less power requirements and seamless integration with the company's Nextiva video management software. The new Nextiva encoders, built for easy installation and operation in virtually any environment, also feature state-of-the-art power supplies that are ENERGY STAR® qualified, meeting strict energy-efficient guidelines that help protect the environment. Further, with 25 percent weight reduction, the encoders' compact and cutting-edge product design helps diminish carbon emissions produced during shipping-allowing for greater flexibility in system design and deployment. Video management software furthers compliance, server capacity and virtualisation In addition, recent enhancements to the Nextiva video management software include H.264 compliance, which allows for double the number of recorded cameras per server. Verint Nextiva is a comprehensive solution built on a standards-based, open architecture engineered for scalability, rapid deployment and ease of maintenance. The latest solution builds on this foundation and offers new features that support server virtualisation-helping organizations consolidate and reduce their IT operational and maintenance costs. "As ever, Verint is committed to delivering innovative solutions that simplify and make it more cost-effective for organizations to meet their security requirements. We believe these enhancements, and others to come, will serve the market well-enabling users to effectively manage and maximize their IP video system investments," says Elan Moriah, president, Verint Video Intelligence Solutions and Verint® Witness Actionable Solutions®.Add to Compare
Built on a decade of deploying over one million ports, the Nextiva S1800e single- and dual-port encoders are ideal for one- or two-camera implementations in distributed networks, in which excellent video quality, a compact design, and storage and bandwidth optimisation are key. The S1800e single- and dual-port encoders couple superior video resolution up to three H.264 video streams D1/25fps and storage on the edge-a failover mechanism that ensures video is recorded in case connection with the management software is lost.Model: S1801e, 1-port video encoder, triple H.264 streams@D1/25fps + MJPEG-4 stream@4CIF/25fps, storage on the edge functionality (SDHC MicroSD card, not included), Energy Star power supply included Model: S1801e-PoE, 1-port video encoder with PoE support (PoE injector not incl.) triple H.264 streams@D1/25fps + MJPEG-4 stream@4CIF/25fps, storage on the edge functionality (SDHC MicroSD card, not included), Energy Star power supply included Model: S1802e, 2-ports video encoder, triple H.264 streams@D1/25fps + MJPEG-4 stream@4CIF/25fps, storage on the edge functionality (SDHC MicroSD card, not included), Energy Star power supply included.Add to Compare
12 channels, Alarm Input, MPEG-4, RTP/IP, UDP/IP, TCP/IP, or multicast IP, DNS, NTP, HTTP, FTP, and DHCP, 10 ~ 100Base-T Ethernet, 704 x 576, 30Kbps ~ 6Mbp, 30 fps, 432 x 155 x 44, 2400, 20W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 95, 1 Vpp into 75 ohmsAdd to Compare
Key additions to Verint's Nextiva® IP Video portfolio were introduced at ISC West 2010 with a new line of high-definition and H.264-enabled single- and multi-port edge devices. Combining exceptional performance with an outstanding feature set, the solutions are designed to help organizations establish cost-effective, modular physical security infrastructures that are best-in-class. These latest security offerings support the Verint®Video Intelligence Solutions™ unified portfolio strategy that enables users to integrate all security operations within the IP network. With the Nextiva IP Video portfolio, organizations can experience such benefits as operational flexibility, greater protection capabilities, high reliability and lower total cost of ownership. Among the current and upcoming additions to Verint's expanded IP video portfolio are the following solutions: Nextiva S1800e Single- and Dual-Port Encoders Featuring H.264 Technology Built on a decade of deploying over one million ports, the Nextiva S1800e single- and dual-port encoders are ideal for one- or two-camera implementations in distributed networks, in which excellent video quality, a compact design, and storage and bandwidth optimisation are key. The S1800e single- and dual-port encoders couple superior video resolution up to three H.264 video streams 4CIF/30fps and storage on the edge-a failover mechanism that ensures video is recorded in case connection with the management software is lost. Nextiva S1816e-SP 16-Port Video Encoder An addition to the S1800e multi-port product line, the Nextiva S1816e-SP is ideal for banking, retail and other video surveillance applications in which cost, storage and bandwidth optimisation are key. The streamlined video encoder combines excellent image quality-up to 4CIF/15fps on every port-with the dramatically lower bitrate of H.264 video compression. Using the versatile, affordable Nextiva S1816e-SP, users can capture images from up to 16 cameras per encoder, with fewer processing, storage and bandwidth requirements (up to 50 percent over MPEG-4), and a significantly lower overall cost. Nextiva HDR 1800 High-Definition Receiver Featuring H.264 Technology The Nextiva HDR 1800 video decoder/receiver combines excellent performance, high-definition technology and H.264 video decompression to enhance the functionality and versatility of Nextiva Virtual Matrix implementations. Ideal for video surveillance applications that call for high-definition video to be displayed at multiple locations, the HDR 1800 can display one to 16 high-resolution video tiles on a single digital wide-screen monitor, or a total of 18 video tiles on two monitors. Nextiva S1801e-R Single-Port Decoders with H.264 & High-Definition Technology Nextiva S1801e-R single-port decoders incorporate advanced H.264 decompression technology to deliver superior quality and performance. The Nextiva S1801e-R compact decoders are designed for use with all Nextiva S1800e Series single- and multi-port encoders and support four to six H.264 video streams, displaying up to four tiles on traditional CCTV monitors and up to six tiles on high-definition LCD or plasma monitors. "Our latest enhancements to the Nextiva IP Video portfolio mark exciting advances designed to help customers ease migration to IP video operations cost-effectively, and with simplified implementation and management," says Elan Moriah, president, Verint Video Intelligence Solutions and Verint® Witness Actionable Solutions®. Verint is at the forefront of networked video technology with nearly two decades of experience delivering security intelligence solutions to government and industry worldwide. With the industry's most comprehensive solution and service portfolio, the company is focused on helping its customers and partners realize the benefits of IP video to achieve strategic security goals.Add to Compare
12 channels, Audio Input, Alarm Input, MPEG-4, RTP/IP, UDP/IP, TCP/IP, or multicast IP, DNS, NTP, HTTP, FTP, and DHCP client, Ethernet 10/100Base-T, 704 x 576, 30Kbps ~ 6Mbps, 25 fps, 432 x 155 x 43, 2,400, 20 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 95, s, 1 Vpp into 75 ohmsAdd to Compare
12 channels, Audio Input, Alarm Input, MPEG-4, RTP/IP, UDP/IP, TCP/IP, or multicast IP, DNS, NTP, HTTP, FTP, and DHCP, 10 ~ 100Base-T Ethernet, 704 x 576, 30Kbps ~ 6Mbps, 30 fps, 432 x 155 x 44, 2400, 20W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 95, 1 Vpp into 75 ohmsAdd to Compare
24 channels, Audio Input, MPEG-4, RTP/IP, UDP/IP, TCP/IP, or multicast IP, DNS, NTP, HTTP, FTP, and DHCP client, Ethernet 10/100Base-T, 704 x 576, 30Kbps ~ 6Mbps, 25 fps, 432 x 155 x 43, 2,400, 24 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 95, 1 Vpp into 75 ohmsAdd to Compare
24 channels, Audio Input, Alarm Input, MPEG-4, RTP/IP, UDP/IP, TCP/IP, or multicast IP, DNS, NTP, HTTP, FTP, and DHCP client, Ethernet 10/100Base-T, 704 x 576, 30Kbps ~ 6Mbps, 25 fps, 432 x 155 x 43, 2,400, 24 W, 12 V DC, 0 ~ 50 C (32 ~ 122 F), 95, 1 Vpp into 75 ohmsAdd to Compare
1 channels, Audio Input, Alarm Input, H.264/MPEG-4, RTP/IP, UDP/IP, TCP/IP, or multicast IP, DNS, NTP, SNMP v1/v2c/v3 (MIB-II), TTP, HTTPS, DHCP client, 802.1x, RJ-45, Ethernet 10/100 Base-T, 720 x 576, 30Kbps ~ 6Mbps, 25 fps, Embedded Linux, 106 x 90 x 42, 260, 5 W, 12 V DC, 0 ~ 55 C (32 ~ 131 F), 95, 1 composite, 1 Vpp into 75 ohms NTSC/PAL, BNC femaleAdd to Compare
Verint® Systems Inc. presents its Nextiva® IP Video portfolio including a new line of single- and multi-port edge devices and high-definition, H.264-powered IP cameras. Combining exceptional performance with an outstanding feature set, the solutions are designed to help organizations establish cost-effective, modular physical security infrastructures that are best-in-class. These latest security offerings support the Verint® Video Intelligence Solutions™ unified portfolio strategy that enables users to integrate all security operations within the IP network. With the Nextiva IP Video portfolio, organizations can experience such benefits as operational flexibility, greater protection capabilities, high reliability and lower total cost of ownership. Among the current and upcoming additions to Verint's expanded IP Video portfolio are the following solutions: Nextiva S1800e Single- and Dual-Port Encoders Featuring H.264 Technology Built on a decade of deploying over one million ports, the Nextiva S1800e single- and dual-port encoders are ideal for one- or two-camera implementations in distributed networks, in which excellent video quality, a compact design, and storage and bandwidth optimisation are key. The S1800e single- and dual-port encoders couple superior video resolution up to three H.264 video streams 4CIF/25 fps and storage on the edge - a failover mechanism that ensures video is recorded in case connection with the management software is lost. Nextiva S1816e-SP 16-Port Video Encoder An addition to the S1800e multi-port product line, the Nextiva S1816e-SP is ideal for banking, retail and other video surveillance applications in which cost, storage and bandwidth optimisation are key. The streamlined video encoder combines excellent image quality - up to 4CIF/12.5 fps on every port - with the dramatically lower bitrate of H.264 video compression. Using the versatile, affordable Nextiva S1816e-SP, users can capture images from up to 16 cameras per encoder, with fewer processing, storage and bandwidth requirements (up to 50 percent over MPEG-4), and a significantly lower overall cost. Nextiva S5000 Series High-Resolution H.264-Powered IP Cameras The introduction of the Nextiva S5000 Series of IP cameras expands the breadth of Verint's camera portfolio, bringing six new models to the market. These professional IP cameras - which include fixed, indoor dome and outdoor vandal-resistant IP66 dome models - feature resolutions from VGA to high-definition 2.0 megapixels to accommodate a wide range of video security requirements. Dual streaming and supported video compressions from H.264 to MJPEG and MPEG-4 help optimize use of valuable bandwidth and storage. Nextiva S5000 IP dome cameras are fully integrated with the Nextiva Video Management software - which is comprised of centralised device management, automated health monitoring and remote video viewing - and with other Verint solutions, including the Nextiva EdgeVR® IP-based network video recorder. "Our latest enhancements to the Nextiva IP Video portfolio mark exciting advances designed to help customers ease migration to IP video operations cost-effectively, and with simplified implementation and management," says David Parcell, Managing Director, EMEA, Verint Systems. Verint is at the forefront of networked video technology with nearly two decades of experience delivering security intelligence solutions to government and industry worldwide. With the industry's most comprehensive solution and service portfolio, the company is focused on helping its customers and partners realize the benefits of IP video to achieve strategic security goals. Click to download Verint Edge Device Brochure.Add to Compare
18 channels, 3, H.264/MPEG-4, TCP/IP, UDP/IP, RTSP/RTP, IGMP, FTP, APIPA, RJ-45, Ethernet 10/100/1000 Base-T, 1920 x 1200, 30 fps, PTZ, Embedded OS, 280 x 190 x 44, 1,910, 30 W, 19 V DC, 0 ~ 40 C (32 ~ 122 F), 0 ~ 95Add to Compare
Browse Video Servers (IP Transmission) / Video Encoders
Video server (IP transmission) products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
We’ve just endured an event that was unprecedented in recent history. COVID-19 greatly affected our lives: our daily activities, the health and well-being of our families and friends, and business operations as we know it. Now that stay-at-home restrictions have been lifted, organizations are preparing for employees to return to work. Confidence surrounding the return to the office hinges on the employees’ perceptions of how well they will be protected while at work. One thing is certain: There is a lot of work ahead. Let’s look at some of the challenges enterprises can expect to face and how to best address them. Addressing the Return to the Office To say that the COVID-19 pandemic has disrupted operations around the world, is the understatement of the decade. That being said, businesses and governments are under mounting pressure to restart their operations as quickly as possible. With ‘social distancing’ and other measures helping to curtail the spread, organizations are turning their attention to a critical question, “How do we effectively restart operations, while protecting our employees’ and citizens’ health and safety?”As organizations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control In the absence of defined contingency plans, industry standards or regulatory guidance, organizations are looking for innovative ways to help address a host of new challenges. Businesses are not just focused on response or monitoring of hot zones during the pandemic; they’re also thinking about afterward, when people return to the daily activities and the workplace under a different, new set of circumstances. Embarking on this journey and being successful requires a key element: the insight to adapt. As organizations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control: their employees’ safety, operating models, and existing compliance requirements. Building Confidence Adjusting these elements demands a pragmatic approach that addresses the potential risk to employees in various environments while also delivering a degree of confidence to customers that an organization is taking a meaningful, proactive posture to keep people safe and healthy. Also, as circumstances change, obtaining the insight to adapt to those changes is crucial for businesses to stay one step ahead and remain agile. One example of this, that we expect to impact the future of business, is the increased use of mobile applications to provide remote health checks of employees while delivering push notifications of wellness tips, rapid communication when issues arise, and response to a call for help in case of emergency changes in health status. Employee monitoring To illustrate the point, having employees provide current symptom status and temperature before arriving at work can help to establish a baseline. Upon arrival, they complete a quick check-in to verify the information before entering the premises.It is important to remember that private health information is being shared, requiring adherence to existing privacy requirements In this instance, it is important to remember that private health information is being shared, requiring adherence to existing privacy requirements, documentation, record keeping and accuracy checks. Doing so manually is a significant challenge, hence the need for a systemic approach. Organizations are looking for applications that map to their current needs, can scale to larger populations as needed and remains adaptable to emerging requirements and legal mandates as they evolve. We expect to continue to see new use cases like this evolve as organizations implement new approaches to daily operation. Regardless of the use case, the underlying driver is that access to information and flexibility is critical and the ability to respond quickly is vital. Looking to the Future As we all adjust to different ways of operating, business and security leaders need to keep a few guidelines in mind. First, it is critical to identify the mission-critical challenges that are most relevant to your operations. What works for an organization down the road, may not work for your business. Next, you need to implement processes and policies that are flexible enough to fit your situation, scalable to larger or smaller groups and adaptable to new requirements be they regulations, standards, processes or new technologies. And lastly, above all else, be pragmatic. The solution should not be worse or more complex than the problem. As we move out of this phase and into the weeks, months and years ahead, there is hope. By empowering your team and the overall business to realize stronger risk awareness, deeper threat detection and prevention, and broader visibility, you can develop a return-to-work strategy that enables you to get your operations up-and-running quickly and efficiently.
The Security Industry Association (SIA) has announced the 2020 winners of the SIA New Product Showcase Awards, the flagship awards program in partnership with ISC West recognizing innovative security products, services and solutions. Top among the winners – who were recognized July 9 during a virtual awards show – was Leica Geosystems, part of Hexagon, receiving the 2020 Best New Product Award. Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2020, following significant deliberations, the 30 judges presented awards for technologies covering 23 product and service categories. Leica Geosystems, part of Hexagon, received the Best New Product honor for its 3D Surveillance with Leica BLK247, submitted in the Emerging Technologies category. Building security The 3D Surveillance with Leica BLK247 is “a first-of-its-kind reality capture sensor for building security and operations,” said Leica Geosystems. “It is the latest product in the company’s BLK product line, a collection of reality capture, scanning and photogrammetry hardware and software. The BLK247 offers continuous, 24/7 LiDAR-based 3D monitoring and change detection within spaces. It does this using LiDAR, 3D digital fencing and continuous scanning to monitor buildings and spaces 24 hours a day, 7 days a week.” The prestigious Judges’ Choice Award was presented to Suprema Inc. for the Airfob Patch product, submitted in the Access Control Devices & Peripherals Hardware – Wireless category. “Airfob Patch is the world’s first mobile-to-RF-card signal translator, enabling mobile phones to communicate with the existing RF card readers,” said Suprema Inc. “Wire, batteries nor construction is required for installation. Airfob Patch charges itself by using the existing RF field signals transmitted from the RF reader. It transforms the RF fields into its own power source.” New Product Showcase Merit Award SIA is proud to present John Spooner with the 2020 SIA New Product Showcase Merit Award" Additionally, John Spooner – executive vice president at Alarm Detection Systems and an active volunteer judge in the SIA New Product Showcase program. Spooner received the New Product Showcase Merit Award, which recognizes an individual or company who, through their support of the New Product Showcase, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. “SIA is proud to present John Spooner with the 2020 SIA New Product Showcase Merit Award; John has not missed a single SIA New Product Showcase event since he began as an active volunteer judge in the program 17 years ago,” said Chris Grniet, chair of the SIA New Product Showcase Committee. “He has always been a fair and honest participant and has never hesitated to jump in and help whenever we need him. He has been exemplary in his commitment, participation and ability to help the group reach consensus.” Services and contributions “Following hours of panel-driven judging and technology demonstrations, SIA is thrilled to recognize the 2020 winners of the SIA New Product Showcase Awards for their innovative products, services and contributions representing the best new offerings in the market,” said SIA CEO Don Erickson. “SIA applauds all the honourees who received awards in 2020 and particularly Leica Geosystems and Suprema Inc. for standing out in this highly competitive field of entrants to earn the Best New Product and Judges’ Choice distinctions. Additionally, we congratulate John Spooner on receiving the 2020 New Product Showcase Merit Award in recognition of his many valuable contributions to this premier program.” Award winners The 2020 SIA New Product Showcase winners are: Best New Product Award Winner – Leica Geosystems, Part of Hexagon: 3D Surveillance with Leica BLK247 Judges’ Choice Award Winner – Suprema Inc.: Airfob Patch New Product Showcase Merit Award Winner – John Spooner, executive vice president, Alarm Detection Systems Category Awards Access Control Devices & Peripherals Hardware – Wireless Winner – dormakaba: BEST Switch™ Tech Access Control Software, Hardware, Devices & Peripherals – Wired Winner – Swiftlane: Swiftlane Access Control Honorable Mention – Altronix Corporation: Tango Anti-Terrorism/Force Protection and Biometrics Winner – Gibraltar Perimeter Security: G-1441 Ultra-Shallow Bollard Winner – IDEMIA: VisionPass Commercial Monitoring Solutions Winner – IronYun Inc.: AI NVR Edge Analytics Communications and Networking Solutions Winner – Axis Communications, Inc.: AXIS C8210 Network Audio Amplifier Convergence and Integration Solutions Winner – Blue Light: Blue Fusion Design, Diagnostic and Installation Tools Winner – Alarm.com: On-Site Wrap Up Emergency Communication Systems Winner – Verint: NowForce Emerging Technologies Winner – BioConnect: BioConnect’s Unified Mobile Access Solution Winner – IPVideo Corporation: HALO IOT Smart Sensor 2.0 Fire/Life Safety Winner – Kidde: Kidde Optica Smoke Detectors Hosted Solutions/Managed Services Winner – SiteOwl: SiteOwl Intrusion Detection and Prevention Solutions (Physical) – Wireless Winner – Alula: Slimline Touchpad Honorable Mention – Cartell: CW-SYS Wireless Driveway System Lock and Key Solutions Winner –Medeco: All Weather Padlock Honorable Mention – Abloy Oy: ABLOY® BEAT Mobile Solutions (Connected) Winner – CloudScann: Visual Intelligence Control Center (VICC) With VisualC3 Mobile Honorable Mention: Rapid Response Monitoring: rapidSMS Smart Home Solutions Winner – Alarm.com/Building36: Smart Water Valve+Meter Threat/Risk Management Software Applications Winner – Splan Inc.: SIVI™ – Splan Intelligent Visitor Insights Video Surveillance Advanced Imaging Technologies Winner – Axis Communications, Inc.: AXIS Live Privacy Shield Video Surveillance Cameras (HD/Megapixel) Winner – Bosch Security and Safety Systems: MIC IP Ultra 7100i Honorable Mention – Hanwha Techwin: PNM-9085RQZ Video Surveillance Data Storage Winner – Dragonfruit AI: Dragonfruit LiveArchive Video Surveillance Hardware and Accessories Winner – EIZO Inc.: FDF2711W-IP Video Surveillance Management Systems Winner – Airship Industries, Inc.: Airship EMS v5.4.5 During the 2020 SIA New Product Showcase virtual awards ceremony, in addition to the presentation of the overall and category-specific awards, attendees enjoyed hearing insights from New Product Showcase judges into innovations driving product advancements in the security industry.
Verint® Systems Inc. will host a webinar on Thursday, July 16, during which a panel of speakers will discuss how banks can take the best approach to welcome customers back into their branches as businesses begin to reopen. While some speculated that branch banking might disappear altogether, demand for banking services has not wavered; just 3% of Americans say they would stop using branch banking entirely in the aftermath of the pandemic. July 16, Reopening the Doors: Addressing Compliance, Health, and Community-Focus Areas for Financial Organizations. Security, health and safety consideration In this webinar, panelists will address the legal considerations, new regulations and the critical factors for developing a return-to-work plan that balances security, health, and safety. Speakers will discuss the current state of the financial industry and how banks can take the best approach to welcome customers back into their branches. Panelists include: Kirk Monroe, Executive Vice President, Executive Director of Lending Services, Vectra Bank Sarah Auchterlonie, shareholder at Brownstein, Hyatt, Farber, and Schreck Allison Gambill, Litigation Attorney at Brownstein, Hyatt, Farber, and Schreck Ian Kildow, Financial Fraud Investigative Supervisor at the Colorado Office of the Attorney General, Department of Law "As a trusted partner to financial institutions throughout North America, we have a responsibility to help organizations plan for and adapt to the reopening of branches," says Verint’s Matt Tengwall, Vice President and General Manager, Fraud and Security solutions. "This webinar is designed to provide banks and credit unions with timely information as they evaluate the processes, timelines and guidance needed to help ensure a safe and healthy environment."
Related white papers
Reducing The Cost of Video Surveillance System Deployment and Operation
Five Things To Consider For AI With Video Technology
Making Your Surveillance Cyber Secure
6 Questions To Ask When Choosing A Security SystemDownload
'Boosting On-Site Safety And SecurityDownload
Optimize Your Business with Analytics and AIDownload
- SureCloud Helps Equiom To Enhance Cybersecurity And Manage Vulnerabilities
- HPE Enhances Data Storage Solution For The Irish Prison Service Along With Scality And CTERA
- Dahua Mobile Solution Installed By ARST Transport Company To Enhance Passenger Security
- United Kingdom Supreme Court Gets Equipped With Panasonic PTZ Cameras For Transparency And Live Streaming