Video Servers (IP Transmission) / Video Encoders(697)
The FUJINON SX800 camera system marks FUJIFILM's successful entry into the surveillance systems market. FUJIFILM presents the new long-range camera module FUJINON SX800 to the surveillance systems market. With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality. Thanks to its powerful 1/1.8" image sensor, the long focal length range of 20 mm to 800 mm and state-of-the-art image processing technology, the FUJINON SX800 is ideally suited for aerial surveillance. In modern society, the security needs of citizens are constantly increasing. Surveillance cameras with long focal lengths are not only used to address sensitive issues such as border security but are increasingly being incorporated into public infrastructure such as airports, seaports and motorways. Long range surveillance systems must cope with special challenges. For optics with long focal lengths, the smallest vibrations are sufficient to compromise the image information. Heat haze or fog in the air also impair image quality. And, a focus drive that is too slow leads to safety-relevant information loss. However, with the development of the new FUJINON SX800, FUJIFILM has found a way to minimize the impact of these challenges. Instead of developing a surveillance camera and a separate matching lens, the concept of a fully integrated system consisting of camera and lens has been realized. In addition to the high-quality zoom optics, the FUJINON SX800 has a powerful combined optical and electronic image stabilization mechanism that provides angle correction of up to ±0.22 degrees. The integrated high-speed autofocus provides a sharply focused image in less than a second, while a fog filter and heat haze reduction technology helps prevent weather interference. The system provides consistently sharp images – even of objects several kilometers away. In addition, the integrated design of the new FUJINON SX800 reduces the high adjustment effort normally required for camera installation. As of Q3 2019, the FUJINON SX800 will be available as both a mobile stand-alone device and as a system that can be integrated into a pan-tilt head.
March Networks Searchlight for Retail enables all types of retail organizations – including specialty retail, grocery stores, quick service restaurants (QSRs) and convenience stores (c-stores) – to reduce losses from theft, oversee operations, improve customer service and increase profits. The intelligent software integrates clear surveillance video with data from retail systems including point-of-sale (POS) and RFID tags to alert loss prevention staff and business owners to instances of potential theft, and reduce investigation times from hours to minutes. In addition, Searchlight’s optional business analytics (e.g. people counting, dwell time monitoring and queue length) combined with video data provide valuable insights on occupancy, speed of service, transactions conducted with no customer present, and customer interest. Available as a standalone software application, or as a hosted software as a service (SaaS) for a low monthly fee, Searchlight for Retail delivers key benefits to retailers including: Transaction Summaries. View and compare user-definable report summaries (voids, refunds, discounts, etc.) to identify potential issues based on transaction trends over time. Transaction Reports. Review transaction data integrated with video to quickly investigate instances of potential internal theft, and to evaluate employee behavior at the POS. Business Analytics. Uncover customer trends and employee Key Performance Indicators (KPIs), and gain insight into overall store or restaurant operations. Operations Audits. Review snapshots from the cameras at your locations to see what’s happening, and discern operational issues like cleanliness, safety concerns, placement of promotional displays, etc. Business Rules. Detect possible fraud by reviewing lists of transactions and events that are important to you, e.g., no sales, safe drops, and transactions that exceed a certain amount, and be automatically alerted about these events via email. Security Audits. Filter by location ID and/or alarm type, and view alarm video from the vantage point of one or multiple cameras; export alarm details along with relevant video and audio evidence. Integrate your video surveillance system with leading POS and RFID software. A portfolio of POS and RFID integrations are available off-the-shelf; customized integrations can be configured as needed.
System OverviewFeaturing powerful optical zoom and accurate pan/tilt/zoom performance, the camera provides a wide monitoring range and great detail. The camera delivers 1080P resolution at 25/30fps. The camera is equipped with smooth control, high quality image, and good protection, meeting compact size demands of video surveillance applications. Functions Starlight TechnologyFor challenging low-light applications, Dahua’s Starlight Ultra-low Light Technology offers best-in-class light sensitivity, capturing color details in low light down to 0.005 lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. EnvironmentalDahua cameras operate in extreme temperature environments, rated for use in temperatures from -30°C to +60 °C (-22 °F to +140°F) with 95% humidity. Subjected to rigorous dust and water immersion tests and certified to the IP66 Ingress Protection rating makes it suitable for demanding outdoor applications. ProtectionThe camera allows for 4KV lightning rating,which provides effective protection for both the camera and its structure against lightning. InteroperabilityThe camera conforms to the ONVIF (Open Network Video Interface Forum) specifications, ensuring interoperability between network video products regardless of manufacturer. Wide Dynamic RangeThe camera achieves vivid images, even in the most intense contrast lighting conditions, using industry-leading wide dynamic range (WDR) technology. For applications with both bright and low lighting conditions that change quickly, True WDR (120 dB) optimizes both the bright and dark areas of a scene at the same time to provide usable video. Smart H.265+Smart H.265+ is the optimized implementation of the H.265 codec that uses a scene-adaptive encoding strategy, dynamic GOP, dynamic ROI, flexible multi-frame reference structure and intelligent noise reduction to deliver high-quality video without straining the network. Smart H.265+ technology reduces bit rate and storage requirements by up to 70% when compared to standard H.265 video compression.
System OverviewFeaturing a dual lens Pan/Tilt/Zoom (PTZ) camera, this series provides an all-in-one solution that is especially beneficial for long distance video surveillance in outdoor applications. Together with Dahua Thermal and Starlight technology, the camera’s long range capabilities are able to be utilized even at night. The series combines one thermal camera for monitoring in total darkness and one camera with Starlight functionality and a motorized lens for confirming details up close. Functions Uncooled Vox TechnologyDahua thermal cameras use uncooled Vox sensor technology. Their small size and better performance make them a cost-effective solution for thermal security. High SensitivityHigh thermal sensitivity (<40mK) allows cameras to capture more image details and temperature difference information. Fire Detection & AlarmWith built-in fire detection functionality, the camera has the ability to detect fires from long range. Because thermal cameras are sensitive to temperature, they provide higher fire detection accuracy than standard cameras, making them particularly fit for applications such as forest fire prevention. Intelligent Video System (IVS)IVS is a built-in video analytics algorithm that delivers intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. A camera with IVS quickly and accurately responds to monitoring events in a specific area. EnvironmentalWith a temperature range of -40 °C to +70 °C, the camera is designed for extreme temperature environments. Subjected and certified to rigorous dust and water immersion tests, the IP66 rating makes it suitable for demanding outdoor applications. For enviorments with rain, sleet, snow and fog, an integrated wiper(optional) provides users with clear visibility at all times. ProtectionThe camera Supporting wide range voltage input(100–300V AC), suitable for the most unstable conditions for outdoor applications. Its 6 kV lightning rating provides effective protection for both the camera and its structure against lightning.
Increase safety and reduce risk on board your transit vehicles with March Networks® RideSafe MT Series IP Recorders. These all-IP units deliver highly-reliable video surveillance recording and management in a compact, rugged design that is ideal for mid-sized vehicles – like student and patient shuttles and paratransit buses. Available in 4-channel and 6-channel models, the RideSafe MT Series solution enables operators to capture everything that’s happening on the bus, inside and out. Whether you have one or a thousand vehicles, this plug-and-play recorder can operate as a standalone unit programmable through embedded software, or be remotely managed and monitored daily using March Networks Command™ for Transit video management software. Video from the recorder can also be integrated with existing CAD and AVL systems and mobile routers. Key RideSafe MT Series features include: Front panel LEDs for easy recorder diagnostics, including operational, recording and video export status Embedded Linux OS, to ensure reliable and secure video recording Real-time health monitoring, alerting operators to camera, recorder and network issues before they affect performance Vehicle metadata integration from CAD/AVL systems and accelerometers for accurate re-enactments, driver monitoring and investigations Configurable recording policies based on schedule, motion, incident/event and other user-definable variables Powerful video management software, providing the advanced tools and features needed to manage entire fleets Automated video and data extraction over WiFi or 4G networks Extended thermal range (ETR) models available
The Evolution 180 Outdoor Camera is built upon Oncam’s expertise and heritage on 360-degree technology. It is specifically designed for applications that require a dewarped panoramic view of an outdoor scene, without blind spots, from a single sensor camera. The 12MP high-resolution sensor and the built-in 3D dewarped panoramic video provides industry leading Panoramic+ views. The true day/night functionality allows images to be produced in all lighting conditions, including additional IR lighting. The camera is IP66, IP67, IP68, IP69K and IK10+ rated, making it a robust design. Its versatile enclosure enables wall and pendant mounting, while the integrated adjustable mounting allows for an angling of up to 45°. When angled, Oncam’s Angle Compensation Technology (ACT) corrects the view, straightening vertical lines in the scene.
VIVOTEK’s FE9391-EV is a market-leading H.265 12-megapixel day-and-night Deep Learning fisheye network camera, featuring a detailed 12-megapixel CMOS sensor which guarantees superb image quality and 360-degree surround views with zero blind spots. Accurate people detection capability Base on VIVOTEK’s people tracking AI engine, the FE9391-EV is equipped with accurate people detection capability which only people activities will serve as event triggers. Furthermore, armed with VIVOTEK’s self-developed Deep Learning Smart 360 VCA technology, the FE9391-EV provides new functionalities including Intrusion Detection, Crowd Detection, and Loitering Detection. These features are the next steps in elevating surveillance cameras from image capturing devices to advanced notification instruments, allowing users to significantly reduce false alarms. Anti-intrusion software To respond the rising cyber risks of IoT device, the FE9391-EV is embedded with Trend Micro’s anti-intrusion software with multi-layer protection, including brute force attack detection, intrusion detection & prevention, and instant damage control. Users can obtain higher cyber security protection and minimize cyber risks of surveillance network. Working together, these advanced features ensure the new smart fisheye camera FE9391-EV is both highly intelligent and robustly secure. Panomorph lens technology The FE9391-EV's use of the latest in panomorph lens technology has led to much improved image quality with a huge drop in edge distortion. It is also updated with the latest in IR illumination, VIVOTEK's Smart IR II technology with Adaptive IR. Adaptive IR enables the FE9391-EV's IR illuminators to adjust to the scene together or individually to provide the best possible IR image, reducing glaring hotspots and/or underexposed dark spots. It is an ideal camera for the open areas such as airports, shopping malls, parking lots, retail stores, offices and more.
The new DC-C4212RX 2MP micro dome camera is the latest addition to the DirectIP® line up from IDIS, which is South Korea’s largest in-country manufacturer of surveillance technology. The compact design of the DC-C4212RX makes it the best choice for understated, less noticeable installation. The neat aesthetics are ideal for applications where there is a need for unobtrusive surveillance but where comprehensive, high-performance video capture is paramount. Measuring only 86 mm x 58 mm and weighing just 105 grams, the DC-C4212RX delivers advanced benefits within its lower profile and is the right choice for high-end locations such as jewellery shops and boutiques, as well as up-market restaurants and luxury hotels. The DC-C4212RX offers all the key benefits that installers expect from IDIS DirectIP dome cameras, including the company’s signature plug-and-play installation and configuration. The elimination of a pigtail cable allows faster and easier deployment. The 3-axis mechanical lens enables rotation and easy angle adjustment, making it an important design feature for precise image capture, particularly when the camera needs to be discretely wall-mounted. The camera can also operate in a wide range of lighting conditions, delivering high performance live monitoring and playback. Other key features include true wide dynamic range (WDR); IR LED illumination up to 15m with day and night ICR; dual codec H.264/H.265 performance; and easy, plug-and-play integration with IDIS VA in the Box. This cost-effective video analytics appliance delivers value-add business intelligence gained from heat mapping, people counting, queue management and comprehensive reporting. “Our new micro dome is a great camera for installers to work with and it delivers outstanding surveillance capability for customers,” says James Min, Managing Director of IDIS Europe. “It further strengthens our end-to-end offering for retail applications, including high street fashion, boutiques, dining, pubs and coffee shops - markets in which we have gained significant market share globally.”
AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables Dahua AI-series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc. The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and more devices. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System Overview With CNN algorithm, Dahua AI positioning system supports intelligent functions like tripwire and intrusion; and supports video metadata function that recognizes motor vehicle, non-motor vehicle, and human to analyze their detailed information. With PFA algorithm, the speed dom e can get clear images all the time during zooming. Together with infra red illumination and Starlight technology, the camera is the perfect solu tion for dark, lowlight applications. Perimeter protection Automatically filtering out false alarms caused by animals, rustling leaves, bright lights, etc. Enables system to at secondary recognition for the targets. Improving alarm accuracy. Starlight Technology For challenging low-light applications, Dahua;’s Starlight Ultra-low Llight Technology offers best-in-class sensitivity, capturing color details in low light down to 0.001 lux. PFA Technology PFA technology has innovatively introduced new methods of judgement to ensure the accuracy and predictability of the direction of subject distance adjustment. The result is a set of advanced focusing algorithms. PFA ensures clarity of the image throughout the process of zooming and shortens focus time. Environmental Dahua cameras operate in extreme temperature environments, rated for use in temperatures from -40 °C to +70 °C (-40 °F to +158 °F) with 95% humidity. Subjected to rigorous dust and water immersion tests and certified to the IP67 Ingress Protection rating makes it suitable for demanding outdoor applications. Protection The camera allows for ±25% input voltage tolerance, suitable for the most unsuitable conditions for outdoor applications. Interoperability The camera conforms to the ONVIF (Open Network Video Interface Forum) specifications, ensuring interoperability between network video products regardless of manufacturer. Wide Dynamic Range The camera achieves vivid images, even in the most intense contrast lighting conditions, using industry-leading wide dynamic range (WDR) technology. Auto-tracking This feature controls the pan/tilt/zoom actions of the camera to automatically track an object in motion and to keep it in the scene. Smart H.265+ Smart H.265+ is the optimized implementation of H.265 codec that uses a scene-adaptive encoding strategy, dynamic GOP, dynamic ROI, flexible multi-frame reference structure and intelligent noise reduction to deliver high quality video without straining the network.
Hikvision has released a new Thermal Bi-spectrum Deep Learning Turret Camera, which will bring enhanced capabilities of indoor fire detection, including an advanced temperature anomaly alarm and visual warning. This new cost-effective camera (DS-2TD1217/V1 Series) reduces the risks of fire and property loss. Bi-spectrum image technology Hikvision’s Thermal Bi-spectrum Deep Learning Turret Camera supports fire detection using high-quality internal hardware components to capture images using both visible light and infrared light, also called “bi-spectrum” image technology. The bi-spectrum image technology creates a picture-in-picture preview and image fusion, which can capture what caused the alarm and help personnel to check the situation quickly. It monitors through only one channel, reducing bandwidth and simplifying the live preview procedure of switching channels between thermal and optical channels. The bi-spectrum image fusion function also provides more image details under different environmental circumstances, making it easier to find hidden objects and document unusual events. The camera's image processing technology combines multiple image processing techniques to create the best thermal imaging results. It also utilizes a “noise equivalent temperature difference” (NETD) of less than 40 mK (this is a measure for how well a thermal imaging detector distinguishes between minute differences in thermal radiation within an image). This means that the lower the temperature difference sensed by the camera, the smaller the value and the better the image. Temperature anomaly alarm This new thermal camera also features a reliable temperature anomaly alarm, which will trigger an alarm once the temperature goes higher than a user-set limit. This setting effectively improves the pre-warning capability before a fire occurs, and can alert safety personnel to eliminate hidden dangers before the temperature reaches ignition or combustion. In a practical application, it can help to detect smoking behaviors in the first place, especially for areas that are clearly prohibited from smoking like shopping malls or that are heavily banned like oil depots. Through effective alarms, staff can find and stop the person from smoking in time to reduce environmental pollution or fire damage caused by smoking. Reduce false alarms with Deep Learning In addition, the camera contains a built-in GPU for running the deep learning algorithm to effectively help indoor monitoring and detect illegal intrusion. Its intelligent video content analysis technology can help reduce false alarms by filtering out interference factors such as changes in lighting or movement of animals in the field of view. Only actual threats trigger alarms, making security measures vastly more efficient and preventing unwanted entry. Equipped for double-duty – fire detection and intrusion detection – this camera is highly recommended for use in indoor fire detection and intrusion detection solutions, especially in application scenarios such as warehouses, museums, data centers, and banks. Wide viewing angle (up to 90 degrees) along with relatively small and well-designed camera housings make them easy to install and convenient to use.
The Contera NVR Appliance from Arecont Vision Costar is designed to offer powerful IP recording in an affordable, compact chassis. The Contera NVR Appliance is equipped with an on-board 8 or 16 channel PoE switch, that can be upgraded to 24 channels, allowing for Plug and Play connection with ConteraWS® or ONVIF cameras. With full integration to ConteraWS Web Services, the Contera NVR Appliance offers centralized user management, single sign-on convenience, mobile apps and a web client that allows for easy remote connection to your recorders. Network setup is fast and easy using ConteraWS Web Services, and eliminates the need for port forwarding or DDNS. The Contera NVR Appliance runs on a secure Linux OS and comes preloaded with ConteraVMS® Server software as a turnkey solution.
AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc. The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System Overview Dahua IVSS goes beyond the ordinary NVR products. It is an Intelligent Video Surveillance Server combines video management functions with traditional video storage operations in one device. Besides the basic functions as network video recorder, IVSS is integrated with features such as face detection, face recognition for different business and industrial applications. With build-in deep learning module, IVSS series products adopt video image structuring technology based on deep learning algorithms, achieving high-precision human face recognition and perimeter protection. By applying deep learning artificial intelligence, IVSS allow users to focus on what matters most, improve event response time and help make video actionable. An all new UI design supports device operation and maintenance management, improving the value and experience of surveillance view, and servicing the era of security big data. Functions Face RecognitionSupport record faces by structured data and real-time crosscheck with incredible accuracy to figure out the face with target features. With regular/Stranger mode to trigger kinds of alarm actions for different applications. Perimeter ProtectionAutomatically filtering out false alarms caused by animals, rustling leaves,bright lights, etc. Enables system to act secondary recognition for the targets. Improving alarm accuracy. Video MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Currently, there are four main kinds of metadata in the security industry: human face, human body, and motor vehicle and non-motor vehicle metadata. AI SearchSupport search by metadata of human and vehicles. Support uploading face pictures to NVR and compare them with recorded faces in NVR by similarity. Enable operators to quickly and easily search through multi channels and long duration, efficiently find out when and where a person of interest appeared.
IDIS has launched the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and Smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy. The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market-responsive innovation and meets installer and end-user requests for a more compact 360° camera that can capture high-definition images in all lighting conditions without blind spots. It also lets customers to benefit from heat mapping without the hassle and cost of additional appliances or analytics software. A broad, high-specification camera, in a compact form, the new Super Fisheye 5MP builds on the success of earlier IDIS’s Super Fisheye cameras, including the award-winning 12MP DC-Y3C14WRX. It meets industry demands for clear and accurate image capture, long-term performance and reliability, exceptional de-warping, and a low total cost of ownership. “The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance and is already contributing to successful project wins for our integration partners in retail applications, eating-out sectors, education, healthcare and other environments where customers benefit from cost-effective and simple to use analytics. “Its high performance 360° capability means it can replace multiple fixed-lens cameras and provide complete and clear image capture in a variety of lighting conditions. For our integrator partners, IDIS’s value proposition, fast and seamless installations and performance guarantees have the potential to increase margins, while end-users benefit from savings in terms of lower upfront equipment and installation costs, with reduced maintenance expense and video storage burden,” said James Min, Managing Director, IDIS Europe. The IDIS 5MP IR Compact Fisheye features include: IDIS Smart UX Controls for very high accuracy and ease-of-use, with intuitive “rubber-band” style control to deliver a new level of operator experience. Super smooth de-warping on the camera as well as on desktop applications and mobile devices for added convenience and out-of-hours monitoring. Quick Controls allowing operators to use the CTRL button with a combination of left, right, and wheel mouse clicks for easier and faster investigations. Full protection against video loss thanks to built-in IDIS Smart Failover guaranteeing continued recording in the event of network instability, overload or failure. IDIS Intelligent Codec that delivers H.264/H.265 dual codec performance and significant bandwidth and storage savings, while eliminating the need to upgrade hardware. Quick and simple installation with DirectIP NVRs and true plug-and-play functionality. Reduced potential for cybersecurity loopholes with one-click configuration eliminating the need to manage individual passwords for multiple devices. Heat-mapping to more easily identify hot-spots, dead zones and bottlenecks in retail and eating-out sectors. Intelligent video and event trigger functions including motion detection, active tampering and trip zones. “The IDIS Super Fisheye 5MP Compact camera also scores highly on essential features including, built-in LEDs for IR operation in full darkness (up to 15m); 8 zone privacy masking; true wide dynamic range; ONVIF support; built-in speakers and microphone allowing 2-way communications; industry-leading 5-year free warranty. All these factors come together to deliver a lower cost of ownership to our customers,” continued James Min. IDIS offers an end-to-end, single sourced video offering that delivers unrivalled plug-and-play simplicity, combined with highest-quality performance, compatibility, and a low total cost of ownership and features industry-leading warranties. IDIS will be demonstrating its Super Fisheye range and Total Solution line up12 at IFSEC International on 18-20 June at ExCeL, London, UK.
Dahua AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc.The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System OverviewPro AI series contains Face Capture, Perimeter Protection and People Counting functions. Powered by deep-learning Artificial Intelligence algorithms, significantly improved accuracy. Active Deterrence and Full Color camera are also in this series. Meanwhile, the series features starlight and smart IR technology. This series fully protected from dust and water, certified to IP67 standard. Functions Perimeter ProtectionDahua’s Perimeter Protection functions significantly improved accuracy. Perimeter Protection reduces false alarms and decreases pixel count requirements for object detection. Perimeter Protection features custom tripwires based on object type for automation in limited access areas such as pedestrian or vehicle-only zones. This combination of advanced AI analytics and real-time alerts to a desktop or to a mobile client reduces system requirements and resources resulting in greater surveillance system efficiency. People CountingPeople Counting function uses advanced image processing technology to capture depth information from within images. The camera pairs this information with deep learning algorithms to analyze and detect human bodies and track target objects in real time. The camera provides statistics for separate individuals’ entrance and exit with up to 95% counting accuracy. MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Dahua face detection camera can extract six facial attributes and output the metadata for analysis. ePoE technologyThe ePoE technology of Dahua, designed internally, adopts advanced 2D-PAM3 coding modulation from physical layer, and realizes full duplex transmission over 800 meters at the speed of 10Mbps, or 300 meters at the speed of 100Mbps via Cat 5 or coaxial cable media. Besides, it supports PoE and PoC power supply technology which has greatly simplified construction and wiring. Dahua ePoE technology offer a new way to accomplish long distance transmission between IP camera and network switch. It allows more flexible surveillance system design, improves reliability and saves construction and wiring cost. Protection(IP67, wide voltage)The camera allows for ±30% input voltage tolerance, suitable for the most unstable conditions for outdoor applications. Its 6KV lightning rating provides effective protection for both the camera and its structure against lightning. Subjected and certified to rigorous dust and immersion tests (IP67) , the camera is the choice for installation in even the most unforgiving environments.
March Networks’ new ME3 Pendant IR PTZ camera delivers uncompromising security for large indoor and outdoor spaces, as well as essential features to ensure high reliability, clear image capture and storage efficiency. Ideal for large-footprint environments such as parking lots, big box stores and transit stations, the camera incorporates electronic image stabilisation and HDR, so recorded video is always crisp. Universal Power over Ethernet (UPoE) ensures redundancy and zero downtime by switching to PoE when a camera loses power. And built-in PTZ auto-tracking uses motion detection to automatically track a person or object, keeping the image centered and in focus. Software updates are quick and easy to apply using the mass management feature available in Command Enterprise software, while PTZ-optimized motion histograms speed search capabilities. The 3MP PTZ includes a 40x zoom lens to capture objects 25% further away than industry-standard PTZs, and IR LEDs for uniform illumination in total darkness at a distance of more than 650 feet/200 metres. It also incorporates a Low Bit Rate compression mode to improve bandwidth and storage efficiency by as much as 50% when the camera is in its home position. The ME3 Pendant IR PTZ is protected by a weather-proof enclosure, and generates an alert in the event someone attempts to obstruct or move the camera. It comes with a variety of mounting options, including a 1.5” NPT wall mount and short pendant mount, both with back boxes.
Audio Input, Alarm Input, H.264, TCP/IP, UDP, IPv4, IPv6; HTTP, RTP, RTSP, NFS, ISCSI, DHCP, NTP, SMTP, SNMPv1, SNMPv2c, SNMPv3, UPNP, SADP, PPPoE, DNS, FTP; IP Server, Dyndns, PeanutHull, HiDDNS, NO-IP; PSIA, HIKCGI, ONVIF., 1 10 M / 100 M /1000 Mbps Ethernet interface, 1920 x 1080, 60 fps, Linux, 200 x 123 x 39, 1,500, 13 W, 12 V DC, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
8 channels, Data Input, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, SADP(IP Finder),UDP, RTP and NTP, 10/100/1000 Mbps self-adaptive Ethernet interface, 1920 x 1080, 440 x 340 x 70, 5,200, 50 W, 100 ~ 240 V AC, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
1 channels, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, RJ-45 10M/100Mbps adaptive Ethernet, 30 fps, 315 × 45 × 200,Add to Compare
4 channels, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, RJ-45 10M/100Mbps adaptive Ethernet, 30 fps, 315 × 45 × 200,Add to Compare
8 channels, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, RJ-45 10M/100M/1000Mbps adaptive Ethernet, 30 fps, 315 × 45 × 200,Add to Compare
16 channels, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, RJ-45 10M/100M/1000Mbps adaptive Ethernet, 30 fps, 440 × 45 × 274,Add to Compare
1 channels, Audio Input, Alarm Input, H.264, TCP / IP, UDP, IPv4, IPv6; HTTP, RTP, RTSP, NFS, ISCSI, DHCP, NTP, SMTP, SNMPv1, SNMPv2c, SNMPv3, UPNP, SADP, PPPoE, DNS, FTP; IP Server, Dyndns, PeanutHull, NO-IP; PSIA, 1 RJ-45 10 M / 100 M /1000 Mbps adaptive Ethernet interface, 1920 x 1080, 1 / 16 ~ 25 / 30 / 50 /60 fps, 200 x 123 x 39, ? 1500, ? 13 W, 12 VDC, -10 ~ +55 C (-14 ~ +131 F), 10 ~ 90Add to Compare
Audio Input, Alarm Input, VGA - 2 channel, CVBS - 4 channel, H.264/MPEG-4, 1 RJ45 10/100/1000Mbps self-adaptive UTP Ethernet interface, 440 x 340 x 70, 5200, 50 W, 100 ~ 240V AC, -10 ~ +55 C (-14 ~ +131 F), 10 ~ 90Add to Compare
4 channels, Audio Input, Alarm Input, H.264, SADP (IP finder), UDP, RTP and RTSP , 1 RJ-45 10 M / 100 M /1000 Mbps adaptive Ethernet interface, 25 fps / 30 fps, 315 x 201 x 45, 2000, 8 W, 12 V DC, -10 ~ +55 C (-14 ~ +131 F), 10 ~ 90Add to Compare
4 channels, Audio Input, Alarm Input, H.264, SADP(IP Finder), UDP, RTP and RTSP , 1RJ-45 10 M / 100 Mbps self-adaptive UTP Ethernet interface, 4CIF , 25 fps / 30 fps, 201 x 136 x 42, 2000, 8 W, 12 V DC, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
2 channels, Audio Input, Alarm Input, H.264, SADP (IP finder), UDP, RTP and RTSP, 1 RJ-45 10 M / 100 M /1000 Mbps adaptive Ethernet interface, 4CIF, 25 fps / 30 fps, 315 x 201 x 45, 2000, 8 W, 12 V DC, -10 ~ +55 C (-14 ~ +131 F), 10 ~ 90Add to Compare
1 channels, Data Input, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, 1 RJ-45 10 M / 100 Mbps adaptive Ethernet interface (PoE), 30 fps, PTZ, 80 x 39 x 90,Add to Compare
4 channels, Data Input, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, 1 RJ-45 10 M / 100 Mbps adaptive Ethernet interface (PoE), 30 fps, PTZ, 114 x 48 x 128,Add to Compare
8 channels, Data Input, Audio Input, Alarm Input, H.264/ JPEG /M-JPEG/MPEG-4, IPv4/v6, HTTP, HTTPS, QoS layer3 DiffServ, FTP, SMTP, Bonjour, UPnP, SNMPv1/v2c/v3(MIB-II), DNS, DynDNS, hkDDNS, NTP, RTSP, RTP/RTCP, TCP, UDP, IGMP, ICMP, DHCP, ARP, SOCKSv4/v5, PSIA, OnVIF, Hik CGI, netFilter, 1 RJ-45 10 M / 100 M /1000 Mbps adaptive Ethernet interface, 30 fps, PTZ, 315 x 45 x 200,Add to Compare
Browse Video Servers (IP Transmission) / Video Encoders
Video server (IP transmission) products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
Mobile Access- What You Need To Know (Part 1)Download
- March Networks’ Video Solution Used At Quik-E C-Store To Protect Profits And Recoup Losses
- Rasilient Completes Phase II Of The Video Surveillance System Upgrade At Fairbanks International Airport
- Panasonic’s Facial Recognition Technology Helps Jumbo Ten Brink Food Win The Safest Store Award In The Netherlands
- Hanwha Techwin's Wisenet cameras installed at Beykent University to support medical students’ education