Dahua Technology Consoles, racks & desks(8)
Browse Consoles, racks & desks
Consoles, racks & desks products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Security control rooms should be functional and durable, and their aesthetics should incorporate matching colors that are conducive to a 24/7 operating environment—not too much contrast and easy on the eyes. Another factor driving aesthetics is an enterprise’s desire to create a ‘showpiece’ to demonstrate a commitment to security for shareholders and other stakeholders. “Everyone wants to have a good-looking control room and a cost-effective design,” says Matko Papic, Chief Technology Officer of Evans Consoles. Critical Role Of Lighting And Aesthetics “Lighting is a critical factor for operators,” adds Papic. Studies of control rooms have sought to address issues of circadian rhythms (physical, mental, and behavioral changes that a person undergoes over a 24-hour cycle, based on responses to light) and the impact of changing light colors throughout the day. Flexibility is key. Properly adjusted light can increase alertness at 2 a.m.; controlling the color, tone and intensity of light can increase productivity any time of day. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting Aesthetics, depending on the control room, can be very important, agrees Randy Smith, President of Winsted. His company accommodates aesthetics by using a variety of matching laminates, solid (Corian-type) surfaces, and sometimes real wood. They can put in a console with matching work surfaces, a credenza or other furnishings, or can even match existing décor in a facility. Customized Tailored Furnishing Security control rooms, often operating in glass enclosures, are often used to “make a statement” about the security of a facility, says Smith. Companies want the control rooms to be up-to-date, and have “cool designs.” Sometimes they want to add a company logo to a work surface or side panels, or they want to employ corporate colors in the design. Winsted can customize its offerings to meet any such requirements, says Smith. In too many instances, the control room is an afterthought: They just install furniture that fits with the monitors. How the furnishings are tailored to the operator is often not considered, says Papic. He offers several other considerations: Will the furniture last the lifetime of the control room? How adaptable is a design to possible future changes, whether larger monitors, managing cables, or ability to reconfigure the console? Furniture should not be viewed as a transactional item; there are more issues to address beyond physically housing the equipment, says Papic. Read part 5 of our Control Rooms series here
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The Public As An Additional Security And Safety Sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organization recognized that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their cellphones that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combating Control Room Information Overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application Of Roaming Smart Sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging Existing Hardware Infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that while many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organizations need to do is know how to switch it on and leverage it.
Dahua Technology, a renowned, video-centric provider of smart IoT solutions, announced a major rebranding to reflect the company’s growth and evolution within the North American video surveillance market. WizSense (pronounced “Wise Sense”), Simplified Analytics for Accurate Results, and WizMind (pronounced “Wise Mind”), Advanced Analytics for Ultimate Performance, will be sub-categories under Dahua’s Analytics+ umbrella. Each line encompasses existing product lines as well as new product offerings. “With this launch, we are unifying our products under two new product categories, WizSense and WizMind, to align with new and existing customer’s needs in finding solutions faster,” remarked Jennifer Hackenburg, Senior Product Marketing Manager of Dahua Technology USA. Video surveillance solutions The rebranding includes a top-to-bottom implementation of the WizSense and WizMind product lines. Changes will be reflected throughout the company’s website including the product search tool filter, datasheets, product boxes and communications. Dahua’s new brand assets include a full quick guide highlighting all products from each segment, a new website landing page and other visual communications to convey Dahua solutions in an understandable way. WizSense, the more foundational of the two categories, offers simplified analytics for accurate results The recategorization is designed to help security dealers and integrators more easily identify which video surveillance solutions are better suited for small installations versus advanced enterprise applications. WizSense, the more foundational of the two categories, offers simplified analytics for accurate results. Smart motion detection Basic enough to meet the needs of most users, WizSense products have an AI chip that delivers features like smart motion detection, perimeter protection, and active alarm for protecting what matters most. Other analytics allow for instant alerts, quick target searches after an event, and maximized storage with Dahua’s Smart H.264/H.265+ codecs. The WizSense portfolio includes 4MP and 5MP bullet, dome, wedge and eyeball cameras that were formerly part of Dahua’s Lite series and that offer Starlight Technology, True WDR, Smart IR illumination and IP67 housing. Also in the WizSense family are 2MP and 4MP PTZs formerly from Dahua’s Pro series, as well as new cost-effective thermal cameras. Compatible with the WizSense collection are NVR and Penta-brid recorders with 2TB, 4TB, 6TB, and 8TB options. Human temperature monitoring WizMind offers advanced analytics for ultimate performance. This high-end analytics line - with a powerful AI chip and renowned deep learning algorithms - gives users privacy protection, video metadata, highly accurate people counting, heat mapping, smart tracking and non-contact human temperature monitoring . WizMind is designed to meet the requirements of high-end vertical markets with in-depth demands, such as finance, retail, stadiums, energy, refineries, and transportation. WizMind cameras consist of formerly-Pro-series 4MP bullet and eyeball cameras, 4MP and 5MP dome cameras, and cameras built for specialized applications, such as 5MP and 12MP Fisheye cameras, multi-sensors, thermal cameras and PTZs. Compatible NVR and Penta-brid recorders come in 4TB, 8TB, and 10TB models. Thermal temperature monitoring solutions These solutions should not be solely used to diagnose or exclude a diagnosis of COVID-19 or any other disease “WizSense and WizMind technologies both take security further by providing advanced analytics that provide deeper insights, increased accuracy, and time saving alerts,” said Hackenburg. “By offering this new streamlined branding, it is easier than ever for dealers to find the line of technology that will include the level of analytics needed for their installation.” Dahua’s thermal solutions, including the SafetyTemp Thermal Temperature Station, the Thermal Temperature Monitoring Solution, and the Handheld Thermal Temperature Monitoring Device, are not FDA-cleared or approved. These solutions should not be solely or primarily used to diagnose or exclude a diagnosis of COVID-19 or any other disease. Telethermographic temperature measurement Elevated body temperature in the context of use should be confirmed with secondary evaluation methods (e.g., an NCIT or clinical grade contact thermometer). Public health officials, through their experience with the solutions in the particular environment of use, should determine the significance of any fever or elevated temperature based on the skin telethermographic temperature measurement. The solutions should be used to measure only one subject’s temperature at a time. Visible thermal patterns are only intended for locating the points from which to extract the thermal measurement.
The COVID-19 global pandemic continues, and more and more companies are looking for ways to continue (or resume) operations while minimizing the coronavirus’s negative impact on their workforce, or potentially contributing to disease spread among the wider population. Thermal cameras have been proposed as a solution to screen individuals for elevated body temperature since the beginning of the pandemic. However, the technology has its detractors, and there are regulatory questions. We asked this week’s Expert Panel Roundtable: How can thermal cameras be used effectively for fever detection to screen for infectious diseases?
Dahua Technology, a video-centric, provider of smart IoT solutions, offers a wealth of low-light technology for surveillance in dark or nighttime environments. The latest addition to their wide-ranging line of security cameras for the Dahua USA market is White-light LED Night Color technology. Dahua Technology USA boasts several different low-light camera models to meet a variety of needs in environments with very low ambient light. Each camera incorporates an ultra-Starlight image sensor, which has a set of optical features to balance light throughout the scene and improve the clarity of the image. Low-light cameras also utilize Smart Image Signal Processing (ISP). Extracting useful information “Smart ISP converts an image into digital form while performing operations that enhance the image and extract useful information. It lets the camera identify and correct imperfections caused by the lens, color filter, or sensor,” explained Jennifer Hackenburg, senior product marketing manager at Dahua Technology USA. Dahua’s flagship low-light standard, Starlight technology, employs large apertures (maximum f/1.6), in addition to the sensors and Smart ISP described above, to balance light throughout the scene. Together, these technologies let Starlight cameras produce richly colored, identification-level images without distortion in illumination of 0.004 to 0.009 lux. Starlight cameras have infrared (IR) cut filters that switch to black and white mode when the camera senses that insufficient light is available to reproduce good color images. When night mode is triggered, the filter disengages, allowing IR as well as visible illumination to reach the image sensor. Achromatic large aperture lens Night Color does not require a True Day Night IR cut filter; instead it uses a high-performance sensor and ISP The latest advancement in light sensitivity is Night Color technology. Night Color cameras use high-performance image sensors that generate exceptional color images long after an IR camera would have converted to a black and white image. Night Color does not require a True Day Night IR cut filter; instead it uses a high-performance sensor and ISP, as well as an achromatic large aperture lens, to produce crisp, clear images. This light-sensitive technology allows the camera to capture more available light, creating full-color images with high detail and contrast. Night Color requires at least 1 lux of ambient or artificial light. When a visual deterrent to crime is imperative, white-light LEDs (Light Emitting Diodes), are built into Dahua’s new 4MP ePoE Night Color Network Dome Camera (N45EJ62). Real-Time perimeter protection Smart illumination, where the camera automatically activates the LEDs at low lux levels, adjusts exposure time and LED intensity to avoid overexposing the image. The camera performs Dahua’s Analytics+ functions at the edge for complex, real-time perimeter protection surveillance, Smart Motion Detection, and face detection. Enhanced Power over Ethernet (ePoE) extends transmission distances up to eight times over CAT5/CAT6 cables and converts existing, coax‐based analog systems into IP systems. “Our broad portfolio of low-light cameras gives installers and end-users a variety of options to choose from, based on their individual needs,” commented Hackenburg. “Whether low lux capabilities are most important, or you need advanced technology that enables full color images in near-complete darkness, Dahua helps security operators see more.”
Exploring New Vertical Markets for Professional Security SystemsDownload
5 Security Lessons For Navigating COVID-19Download
Cloud Video and Smart CitiesDownload
Custom Consoles And Virtual Infosec Africa Deliver MediaWall Video Monitor Display And Desk To A Bank In Ghana
- Custom Consoles And Virtual Infosec Africa Deliver MediaWall Video Monitor Display And Desk To A Bank In Ghana
- eyevis Provides 24/7 Monitoring And Security Technology For Wind Farms In UK
- MOBOTIX Video Surveillance: Protecting Shoppers At Forum Bornova, Izmir
- Thinking Space Provides Control Room Furniture For New CCTV Hub At Blackburn With Darwen Council