Hikvision Digital video recorders (DVRs) (253)
HIKVISION DS-9016HFI-S Intelligent Hybrid DVR supports H.264 video codec, offering real-time viewing and playback with the resolution up to 1280X720, as well as 1280X1024 resolution in VGA displays. The unique feature of the product is its intelligent video analytics and seamless joint of analog and IP solution.Besides, DS-9016HFI-S supports self-diagnosis, reporting and processing once malfunctions occur. The user-friendly GUI of DS-9016HFI-S comes with Windows-style interface and an aesthetic, efficient operating panel.Key Features:Support IP camera with resolution up to HD 720p (1280X720), as well as support analog cameras and IP cameras simultaneously in two ways: sixteen analog cameras plus eight 4CIF IP cameras, and sixteen analog cameras plus four mega pixel IP cameras.High resolution VGA displays (1280X1024).Support Digital Zoom in preview and playback mode.Mouse control PTZ movement.Support maximum Hard Disk Drives capacity (more than 2 TB). Recorded file can be locked in order to prevent the data from being overwritten. Locked file can also be unlocked.HDD can flexibly be set in redundant mode, read-only mode, or read and write mode.Easy to manage backup device by formatting, creating folder, and playing recorded files in backup device.Support remote downloading with resuming capability.Manage and configure IP camera (ex. compression parameters, motion detection, and sensor alarm) locally on DS-9016HFI-S Intelligent Hybrid DVR.Add to Compare
16 channels, Real Time / Timelapse / Event recording, 2, Inbuilt Multiplexer, 6000 GB storage, 25 / 30 fps fps storage rate, H.265+/H.265/H.264+/H.264, 1080p resolution, USB, HDD, G.711u, RCA (2.0 Vp-p, 1 kOhm), 285 x 210 x 45, < 1, 12 V DC, < 15 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
8 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 4 in, 1 out, 4 TB GB storage, H.264, 1280 × 720 resolution, PAL / NTSC, USB, 12 fps, 315 x 230 x 45, 4, 12 V DC, 15 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
16 channels, Real time recording, Inbuilt Multiplexer, Half-duplex, 4000 GB storage, 25 fps / 30 fps fps storage rate, H.264, 1080P resolution, PAL / NTSC, USB, G.711u, 445 x 290 x 45, 4, 12 V DC, 20 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
16 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 4 TB GB storage, H.264, 1920 ×1080 resolution, PAL / NTSC, USB, 704 × 576, 445 x 290 x 45, < 4, 12 V DC, < 20 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
16 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 4 TB GB storage, H.264, 960 x 576 resolution, PAL / NTSC, USB, 30 fps, 200 x 200 x 45, < 1.5, 12 V DC, < 10 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
4 channels, Real time recording, 8, Inbuilt Multiplexer, 4 in, 2 out, 4000 GB storage, 25 fps / 30 fps fps storage rate, H.264, 1080P resolution, PAL / NTSC, USB, 445 x 470 x 90, 8, 100 ~ 240 V AC, 70 W , -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
8 channels, 16, Inbuilt Multiplexer, 16 in, 4 out, 4000 GB storage, 25 fps / 30 fps fps storage rate, H.264, 1080P resolution, PAL / NTSC, USB, 445 x 470 x 90, 8, 100 ~ 240 V AC, 40 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
8 channels, 16, Inbuilt Multiplexer, 16 in, 4 out, 4000 GB storage, 25 fps / 30 fps fps storage rate, H.264, 1080P resolution, PAL / NTSC, USB, 445 x 470 x 90, 8, 100 ~ 240 V AC, 40 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
8 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 6000 GB storage, 30 fps fps storage rate, H.264, 1920 x 1080 resolution, USB, HDD, Simultaneous view, record, playback, backup & remote monitoring, 30, 200 x 200 x 45, 0.8, 12 V DC, 8 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
16 channels, Real Time / Timelapse / Event recording, Inbuilt Multiplexer, 16 in, 4 out, 6000 GB storage, 30 fps fps storage rate, H.264, 8 MP resolution, PAL / NTSC, USB, HDD, Simultaneous view, record, playback, backup & remote monitoring, 30, IP, 445 x 390 x 70, 5, 100 ~ 240 V AC, 65 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
16 channels, Real Time / Timelapse / Event recording, 2, Inbuilt Multiplexer, Half-duplex, 6000 GB storage, 30 fps fps storage rate, H.264+/H.264, 1920 x 1080 resolution, USB, HDD, Simultaneous view, record, playback, backup & remote monitoring, 30, 315 x 242 x 45, 2, 12 V DC, 30 W, -10 ~ +55 C (14 ~ 131 F), 10 ~ 90Add to Compare
Browse Digital video recorders (DVRs)
Digital video recorder (DVR) products updated recently
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
The sound of sirens in the distance is commonplace, nowadays. Whether related to a medical emergency or everyday crimes, such as theft, property crimes, and so on, we’re all accustomed to hearing these sirens by now. It is worth noting that many incidents that police respond to take place at night. According to a recent report by the Sleep Judge, more than half of murders, manslaughter, sexual assaults, robberies, aggravated assaults and motor vehicle thefts happen long after the sun has set. To anyone looking to address the round-the-clock security challenge, deploying the most comprehensive surveillance solution is a must, and this means, looking at the instrumental role illumination plays in video capture. Limitations of Traditional Video Surveillance If surveillance cameras can’t be used to prevent, detect and/or resolve crimes that occur in these areas, the entire security operation is obsolete For surveillance cameras relying on video analytics and artificial intelligence (AI) to deliver functionalities such as facial recognition, license plate reading and motion detection, nighttime crimes can pose something of a problem. Without adequate illumination, images from video cameras are grainy and unusable. Without proper lighting, potential criminals and moving objects essentially become indistinguishable, at night, thereby inhibiting even the most advanced security technologies. This limitation of traditional surveillance technology not only hinders immediate police response, but it also stops crime investigations dead in their tracks. Often, without video evidence that is clear and discernible, conviction in a court of law is next to impossible. A common response to this issue is to place security cameras near streetlights or well-lit areas. After all, according to NPR, street lights are effective in deterring crime, as “there are people — neighbors, pedestrians or police — to actually see suspicious activity.” However, even if streetside and primary entrances are well lit, the areas that still need most to be surveilled are rear or side doorways shrouded by darkness, unlit back alleys, and so on. If surveillance cameras can’t be used to prevent, detect and resolve crimes that occur in these areas, the entire security operation is obsolete. Best-in-class security solutions must be able to see everything, day and night. A Purpose-Designed Solution to the Problem Addressing this issue is easier than you might think. Much like a human eye needs some sort of light to “see,” so does video surveillance technology. Integrating external illuminators into a security solution can optimize camera performance exponentially, expanding a camera’s video capture and coverage abilities and ensuring the operation of video analytics, day and night. Opting for an external illuminator allows system integrators to select a device that matches the exact emission range of a camera’s field of view (FOV). The result is an evenly lit visual field, where captured images are clear and effective for security purposes. The two most common options available to integrators include infrared (IR) and white light illuminators. Each technology is built to optimize particular deployments, depending on their needs. Infrared Versus White Light IR illuminators emit IR light, which is invisible to the human eye and perfect for covert surveillance operations. When cameras need to be able to detect potential threats over long distances, IR illuminators are perfect for the job as they typically have longer emission ranges. IR illuminators are optimal for surveillance operations in license plate recognition, border patrol, safe cities, theme park, and medical sleep lab applications. If an end user needs to implement full-color video analytics for identification purposes, such as facial, object and license plate recognition, white light illuminators are undoubtedly an integrator’s best bet. IR illumination and traditional thermal security cameras, after all, are only able to provide black-and-white images, whereas object recognition software often identifies objects based on their color. White light illuminators installed alongside AI-powered surveillance cameras enable enhanced video image clarity, which, optimizes video analytics performance. When customers want to physically deter suspicious activity, deploying white light illuminators is effective. A recent study out of Crime Labs New York found that businesses that deployed visible lights to deter crime “experienced crime rates that were significantly lower,” which “led to a 36 percent reduction in ‘index crimes’”. On top of all this, LED based white lights operate at low running costs and typically have long lifespans, saving end users thousands of dollars a year in energy costs without having to sacrifice surveillance optimization. External Versus Built-In Illumination Security customers looking to use lighting to deter crime and improve the performance of video surveillance may consider “all-in-one" solutions, as some cameras have LEDs (light emitting diodes) built into them. These LEDs typically encircle the lens and therefore shed light in whatever direction the camera is pointed. However convenient these may seem, built-in illumination can cause problems.Cameras deployed without proper illumination are rendered blind, especially at night First, LEDs built into cameras and next to other electronic components often cause heat to build up, which attracts insects that can trigger motion detection and obstruct a camera’s view. This heat buildup also shortens the LED lights lifespan. Built-in LEDs also tend to create “hot spots” with glare and reflection back into the camera, often because these lights only cover a 30-degree field of view (FOV), even though the average camera’s FOV is 90 degrees. This issue can severely limit a camera’s visibility, essentially rendering those remaining 60 degrees dark and unusable. All in all, when integrating lighting solutions into your security deployment, a cost-effective solution that enhances a camera’s video capture and coverage abilities, are external illuminators because they offer flexible choices of field of view and distances. Best-in-Class Solution When it comes to criminal conviction in a court of law, “seeing really is believing.” Cameras deployed without proper illumination are rendered blind, especially at night, just as any security officer would be when patrolling the same unlit area. To guarantee end users the most reliable and highest performing security solution, consider integrating best-in-class illumination into your offerings.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video Compression Technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF Physical Security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardization organizations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 Compression Formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognizes the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
Hikvision, a manufacturer and supplier of security products and solutions is launching a special, limited-time promotion on the company’s next generation of intelligent AcuSense PCI series cameras. Employing advanced deep learning algorithms, AcuSense cameras can accurately distinguish people and vehicles from other moving targets such as animals and shadows in real-time, vastly improving detection accuracy while reducing costly false alarms. Improve safety and security “Our next generation of AcuSense cameras delivers intelligent features and capabilities that improve safety and security and help eliminate costly false alarms in virtually any environment. AcuSense PCI models use audio and visual alarm messages to actively reduce the risk of intrusion, providing real-time proactive deterrence from crime, intruders, and unwanted behavior,” said Michael Hendrix, director of sales engineering, Hikvision. “These new AcuSense cameras deliver the perfect combination of intelligent performance and cost-efficiency for a wide range of users and applications.” Limited time price reduction For a limited time during the month of May, Hikvision is offering select second-generation AcuSense PCI cameras at a significant price reduction. Those seeking details about the promotion can request additional information online. To learn more about Hikvision’s next generation of AcuSense cameras, join a special open webinar on May 7, 2021. Registration for the webinar is free but space is limited. AcuSense camera features AcuSense cameras precisely sense human and vehicle movement versus non-human objects, reducing false alarms up to 90 percent and improving alarm handling efficiency. New strobe light and audio features on SL models vastly improve on-site response and real-time, proactive crime deterrence. The new generation of AcuSense cameras includes a host of advanced features, including customizable two-way audio warnings, ultra-low light color performance, and camera-accessible cloud video storage.
As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in software, regardless of the manufacturer. In 2019, more than 12,000 vulnerabilities worldwide were made public and reported as a CVE (Common Vulnerability and Exposure) in the National Vulnerability Database (NVD). Unfortunately, vulnerabilities are a given. What really matters is how a company deals with and resolves vulnerabilities. Cybersecurity vulnerabilities Awareness of cybersecurity vulnerabilities is vitally important to protect one, one’s business and the Internet Awareness of cybersecurity vulnerabilities is vitally important to protect one, one’s business and the Internet, but it’s also important to understand that a vulnerability is not synonymous with “backdoor”, and is not necessarily indicative of “cheap quality.” But there are companies out there that are embedding safeguards into their development processes to reduce the risks. One could see them as ‘Sheriffs’, taking steps to make this Wild West a little safer. Hikvision ‘Secure-by-Design’ Manufacturers of IoT devices can significantly reduce these vulnerabilities during the production of devices Security cameras, like all other IoT devices, are vulnerable to cyberattacks. Fortunately, manufacturers of IoT devices can significantly reduce these vulnerabilities during the production of devices, using a process called ‘Secure-by-Design’. Implementation of Secure-by-Design requires a commitment on the part of the manufacturer’s management team and a serious investment in resources and technology, which can result in a longer production process and a higher cost of the IoT device. Cost is often the reason why some IoT device manufacturers do not use Secure-by-Design (and are indeed cheaper). Hikvision is a producer of IoT devices that takes security and privacy very seriously and has implemented Secure-by-Design in its production process. Management supports this process and has even set up a dedicated internal cybersecurity structure charged with product cybersecurity. This group is also the central point of contact for all other cybersecurity matters. Product testing Hikvision Security Development Life Cycle (HSDLC) is an essential part of Hikvision's cybersecurity program The Hikvision Security Development Life Cycle (HSDLC) is an essential part of Hikvision's cybersecurity program. Cybersecurity checks take place at every stage of product development — from concept to delivery. For example, product testing takes place during the verification phase, the company also regularly invites well-known security companies and public testing platforms to conduct penetrating testing. There is no guarantee if Hikvision products are immune to hacking, but the HSDLC is a testament to a manufacturer that makes every effort to produce products that are as cyber secure as possible. In addition to the Secure-by-Design process, Hikvision opened a Source Code Transparency Center (SCTC) lab in California in 2018, being a lab to open such a center. At this center, U.S., the Canadian government and law enforcement agencies can view and evaluate the source code of Hikvision IoT devices (IP cameras and network video recorders). Hikvision firmware Hikvision has a Vulnerability Management Program in place when a vulnerability is discovered It’s important to emphasize that no product is 100 percent secure. Hikvision has a Vulnerability Management Program in place when a vulnerability is discovered in a product. To date, vulnerabilities that have been reported to Hikvision and/or made publicly known, have been patched in the latest Hikvision firmware, and are readily available on the Hikvision website. In addition, Hikvision is a CVE CNA, and has committed to continuing to work with third-party white-hat hackers and security researchers, to find, patch and publicly release updates to products in a timely manner. These vulnerabilities are collected in the National Vulnerability Database (NVD) and are public. Hikvision recommends that customers who are interested in purchasing security cameras inquire about a manufacturer’s cybersecurity practices and if they have an established Vulnerability Management Program. Cybersecurity questions to consider The cybersecurity of IoT devices is a topic that needs to be addressed in a serious way and it should play an essential role in the product development process, beginning at the concept phase of an IoT product. This requires time, investment and knowledge. Consider the following questions: Trust on the manufacturer of a low-cost security camera Manufacturer with a dedicated cybersecurity organization Manufacturer on handling the vulnerabilities These are the questions that everyone should ask themselves when making a purchase, be it a camera or any other IoT product. Cybersecurity practices There is no absolute 100% guarantee of security, but Hikvision has practices to ensure the cybersecurity for its cameras. Cooperation, with its customers, installers, distributors and partners, and full transparency are key elements to successfully secure IoT devices. When one reads cybersecurity news, one is invited to look beyond the headlines, and really get to know the companies that produce the IoT devices. Before one buys a security camera or any IoT device, it is advisable to check out the manufacturer’s cybersecurity practices, look for a company with a robust vulnerability management program, a company that aligns itself with Secure-by-Design and Privacy-by-Design and a company that employs cybersecurity professionals who are ready and eager to answer one’s questions. One may remember that there are Sheriffs out there, as well as bandits.
Businesses are now gradually reopening in many countries, and people can return to restaurants, office buildings, and public spaces. A safe reopening process will rely heavily on effective public health strategies, including increased testing for the virus, social distancing, occupancy restrictions, and cleaning and disinfection activities. In many countries, temperature measurement and the wearing of masks have been commonly made mandatory in both business and public environments. While social distancing and occupancy restrictions are considered necessary in public areas such as shopping malls and transportation hubs, workplaces like office buildings and industrial parks are looking for solutions featuring authorized entries with confidence. In lifting the restrictions for businesses and public areas, innovative video technologies can also help organizations meet and exceed health guidelines for safe and effective reopening. Temperature screening at entry The Centers for Disease Control and Prevention (CDC) in the United States, a very well-known public health organization, have issued new guidelines for reopening offices. The CDC advises daily health checks including temperature screenings before employees enter a workplace. To achieve this, security cameras equipped with thermographic video technology can be an effective tool for rapid and safe initial temperature screening. Applications include, for example, schools, industrial parks, hospitals, office buildings, malls and hotels, etc. Hikvision’s temperature screening solutions offer various product types including installed thermographic cameras, handheld thermographic cameras, metal detector doors, and MinMoe access terminals that can be flexibly deployed for a wide range of applications. Video monitoring for mask compliance Wearing masks is recommended as a measure to contain respiratory droplets and protect the general public. Masks are also commonly included in worldwide health guidelines towards reopening. Store managers also need to identify and mitigate areas where shoppers may congregate Hence, compliance with this guideline has become crucial to many organizations. Video technology can help monitor the use of protective masks in clever and unobtrusive ways. AI algorithms can detect whether a person is wearing a mask. The system then triggers a pre-defined action if no mask is detected, such as, for example, a voice prompt or a link to an access system to deny entry. This provides a simple way to monitor the situation, or even to remind people of the rules. Hikvision’s thermal and AcuSense cameras, as well as MinMoe temperature screening terminals are equipped to detect masks. A specialized interface on Hikvision’s DeepinMind NVRs can also be used to visually display temperature and mask status together, making monitoring much easier. Crowd density control Social distancing plays an important role in “flattening the curve” in the spread of the coronavirus. These technologies use people counting and 3D modeling to measure the distance between people accurately In various countries, the recommended physical distancing might differ slightly, but maintaining a distance of a meter or more (3-6 feet) will remain a key recommendation of health authorities. In addition, store managers also need to identify and mitigate areas where shoppers may congregate, so as to ensure safe shopping spaces. Technologies incorporating social distancing and occupancy detection can be put into places like these to assist the process. Hikvision Flow Control Hikvision’s Flow Control system utilizes highly accurate people counting technology. A clear, dynamic display and real-time alerts ensure pre-defined capacity thresholds are never exceeded, even in locations with multiple entrances and exits, such as, for example, shopping malls and supermarkets. Video solution provides the necessary features and functionalities to assist with the process of social distancing A digital sign can be integrated at entrance areas to display real-time occupancy data, as well as temperature and mask information, letting customers know when it is safe to enter premises. In waiting areas such as cash registers in supermarkets and indoor ATMs in malls, Hikvision’s video solution provides the necessary features and functionalities to assist with the process of social distancing. These technologies use people counting and 3D modeling to measure the distance between people accurately. The exact measurement can be adjusted, well within the social distancing minimum separation guidelines. Touch-free access control Schools and workplaces have previously made use of traditional access control and time attendance systems such as ID card swiping, PIN codes, or fingerprint scans, which require staff and students to frequently touch shared surfaces. This only increases the risk of spreading infection. With touch-free access control terminals, organizations can not only eliminate the risk, but greatly enhance their daily operational efficiency. Hikvision’s MinMoe temperature screening terminals unify temperature screening, mask detection, and access control & time attendance in one model. The system only grants entries when the guidelines are met, which is particularly useful in highly-populated workplaces like industrial parks and office buildings.
Related white papers
Ensuring Cybersecurity Of Video
Security Investments Retailers Should Consider For Their 2021 Budget
Understanding Video Management Systems
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
The Gaylord Opryland Resort And Convention Center Upgrades Their Video Surveillance System With Cameras From Hanwha Techwin
- The Gaylord Opryland Resort And Convention Center Upgrades Their Video Surveillance System With Cameras From Hanwha Techwin
- Education Sector Focuses On Reconfiguring Existing Video Monitoring/CCTV Systems To Help Make School Buildings And College Campuses COVID Safe
- Rapsican Installs RTT110 EDS System At Oslo Airport To Increase Aviation Security
- Hanwha’s Wisenet Camera Captures Live Images Of Volcano Eruption