Panasonic Dome Cameras(23)
1/4 inch, True Day / Night, 650 TVL resolution, PTZ, 0.0013 lux, 0.065 ~ 120 o/ sec pan speed, Digital (DSP), 0.065 ~ 120 o/ sec tilt speed, 220 ~ 240 V AC, 3.3 ~ 119 mm, 256, Auto Gain Control, White Balance, 1/50 ~ 1/10,000, 52, Internal, PAL, Built-in IR LED, 1.0 Vp-p / 75 Ohm, x36, 80 W, 229 x 360, 4,500, -50 ~ +50 C (-58 ~ +122 F), 90, IP66Add to Compare
1/3 inch, True Day / Night, 650 TVL resolution, Static, 0 lux, Digital (DSP), 24 V AC, 2.8 ~ 10.0 mm, 1/120 ~ 1/120,000s, Internal, PAL, Built-in IR LED, 1.0 Vpp / PAL composite 75 Ohm, x3.6, 3.6 W, 123 x 106, 390, -10 ~ +50 C (14 ~ 122 F), 90Add to Compare
1/4 inch, True Day / Night, 650 TVL resolution, PTZ, 0.04 lux, 400 o/ sec pan speed, Outdoor, Digital (DSP), 400 o/ sec tilt speed, 220 ~ 240 V AC, 3.3 ~ 119, 256, Auto Gain Control, White Balance, 1/120 ~ 1/10,000, 50, Internal, PAL, 1 V pp, PAL composite 75 Ohms, BNC Connector, x36, RS485, 80 W, 229 x 360, 4500, –50 ~ +50, 0 ~ 90, IP66Add to Compare
1/3 inch, Colour / Monochrome, 650 TVL resolution, Static, 0 lux, Digital (DSP), 24 V AC, 2.8 mm, Back Light Compensation, Auto Gain Control, White Balance, 52, Internal, PAL, Built-in IR LED, 1.0 V [p-p] / PAL composite 75 ohms, 3.6 W, 123 x 106, 330, -10 ~ +50 C (14 ~ 122 F), 0 ~ 90Add to Compare
1/3 inch, Colour / Monochrome, 650 TVL resolution, Static, 0.05 lux, Digital (DSP), 12 V DC, 2.8 ~ 10.0mm, Back Light Compensation, Auto Gain Control, White Balance, 1/120 ~ 1/10,000s, 52, Internal, PAL, 1.0 Vp-p / PAL composite 75 Ohm, x3.6, 180 mA, 108 x 94, 320, -10 ~ +50 C (14 ~ 122 F), 90Add to Compare
1/3 inch, True Day / Night, 540 TVL resolution, Static, 0.05 lux, Outdoor, Surface mount, 12 V DC / 24 V AC, 2.8 ~ 10, Back Light Compensation, Auto Gain Control, White Balance, 50, Internal/Multiplexed Vertical Drive (VD2), PAL, NTSC, 1.0 V [p-p] / 75 ohms, 2.9 W, 164 x 146, 1 Kg, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour / Monochrome, 650 TVL resolution, Static, 0.08 lux, Indoor/Outdoor, Surface mount, 12 V DC / 24 V AC, 2.8 ~ 10, Back Light Compensation, Auto Gain Control, White Balance, 1/120 ~ 1/10,000 sec, >50, Internal, 1.0 V [p-p] / PAL composite 75, x2, 2.1W, 108 x 94, 320, -10 ~ +50, 90Add to Compare
1/4 inch, Colour / Monochrome, 540 TVL resolution, HD, Static, 0.9 lux, Digital (DSP), surface mount, 12 V DC, 2.5 mm, Back Light Compensation, Auto Gain Control, White Balance, 50, Internal, PAL, 1.0 Vp-p / PAL composite 75 Ohm, 180 mA, 108 x 83, 300, -10 ~ +50 C (14 ~ 122 F), 90Add to Compare
1/3 inch, Colour / Monochrome, 650 TVL resolution, Static, 0.08 lux, Surface mount, 12 V DC / 24 V AC, 2.8 ~ 10, Back Light Compensation, Auto Gain Control, White Balance, 1/120 ~ 1/10,000 sec, >50, Internal, PAL, 3.6x, 2.1W, 108 x 94, 320, -10 ~ +50, 90Add to Compare
1/4 inch, True Day / Night, 650 TVL resolution, PTZ, 0.5 lux, 0.065 ~ 120 o/ sec pan speed, Indoor, 0.065 ~ 120 o/ sec tilt speed, Surface mount, 240 V AC, 3.3 ~ 119, 256, Auto Gain Control, White Balance, 1/120~ 1/10,000, >50, Internal, PAL, 1.0 V [p-p] / PAL composite 75 , x36, Coaxial Multiplex System, RS485, 4.3W, 135 x 202, 1700, –10 ~ +50, 90Add to Compare
1/4 inch, True Day / Night, 650 TVL resolution, 0.0013 lux, 0.065 ~ 120 o/ sec pan speed, Indoor/Outdoor, Digital (DSP), 0.065 ~ 120 o/ sec tilt speed, 220 ~ 240 V AC, 3.3 ~ 119mm, 256, Auto Gain Control, White Balance, 1/50 ~ 1/10,000s, 52, Internal, PAL, Built-in IR LED, 1.0 Vp-p / PAL composite 75 Ohm, x36, 4.6 W, 135 x 202, 1,070, -10 ~ +50 C (14 ~ 122 F), 90Add to Compare
1/3 inch, True Day / Night, 650 TVL resolution, Static, 0.08 lux, Indoor, Surface mount, 12 V DC / 24 V AC, 2.8 ~ 10.0, Back Light Compensation, Auto Gain Control, White Balance, 1/120 ~ 1/10,000 sec, >50, Internal, 1.0 V [p-p] / PAL composite 75, 2x, 2.1W, 108 x 94, 320, –10 ~ +50, 90Add to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, Static, 0.4 lux, Digital (DSP), 24 V AC, 2.8 ~ 10.0mm, Back Light Compensation, Auto Gain Control, White Balance, 50, Internal, NTSC, PAL, 1.0 Vp-p / 75 Ohm, 13.1 W, 164 x 146, 1,050, -10 ~ +50 C (14 ~ 122 F), 90, IP66Add to Compare
1/4 inch, Colour / Monochrome, 540 TVL resolution, 1.2 lux, Static, Surface mount, 12 V DC, 2.5, 180 ~ 140 pan, +/-75 tilt, Back Light Compensation, Auto Gain Control, White Balance, 50, Internal / Multiplexed Vertical Drive (VD2), PAL, 1 Vp-p, 75 Ohms, 180 mA, 108 x 83, 280, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour / Monochrome, 540 TVL resolution, Static, 0.4 lux, Digital (DSP), Flush, Surface, Ceiling mount, 24 V AC, 2.8 ~ 10 mm, Back Light Compensation, White Balance, 50, Internal, NTSC, PAL, 1.0 V [p-p] / 75 ohms, BNC connector, x3.6, 2.9 W, 164 x 146, 1,050, -10 ~ +50 C (14 ~ 122 F), 0 ~ 90, IP66Add to Compare
1/3 inch, Colour / Monochrome, 650 TVL resolution, Static, 0.08 lux, Digital (DSP), 12 V DC, 2.8 ~ 10.0mm, Back Light Compensation, Auto Gain Control, White Balance, 1/120 ~ 1/10,000s, 52, Internal, PAL, 1.0 Vp-p / PAL composite 75 Ohm, x3.6, 180 mA, 108 x 94, 320, -10 ~ +50 C (14 ~ 122 F), 90Add to Compare
1/4 inch, Colour / Monochrome, 570 TVL resolution, 0.04 lux, Continuous Rotation, 400 o/ sec pan speed, 400 o/ sec tilt speed, 220 ~ 240 V AC, 3.8 ~ 114, 360 pan, -5 ~ +185 tilt, 256, Auto Gain Control, 1/50 ~ 1/10,000, 50, Internal, Line-lock, PAL/CCIR, 1.0 Vp-p, 75 Ohms, x30, 13 W, 154.5 (Dia) x 233, 2.2 kg, -10 ~ +50, 0 ~ 90Add to Compare
1/3 inch, Colour, 480 TVL resolution, 1.0 lux, Variable Focus, 3.8 ~ 8, Pan ± 175, tilt ± 75, Back Light Compensation, Auto Gain Control, White Balance, 50, Internal / Line-lock, PAL, x2, PTZ, 160 x 161, 1,900, -10 ~ +50, 0 ~ 90, IP66, Vandal ResistantAdd to Compare
Panasonic System Networks Europe is excited to announce the release of i-Pro SmartHD WV-SC385 network dome camera, an entirely new feature rich Super Dynamic HD model with advanced control functions. The new dome camera provides multiple H.264 (High profile) and JPEG video streams for simultaneous real-time monitoring and high-resolution recording. PTZ control features include a 360-degree map shot that provides the full 360-degree field of view, separated into eight thumbnail images taken at 45-degree intervals - clicking on any thumbnail easily directs the PTZ camera. "Putting customers first compels Panasonic not only to develop new and advanced technologies, but also to design for market needs," said Stephen Gerrard, Country Marketing Manager, Panasonic System Networks Europe "Bringing together high definition and PTZ functionality lets the user capture the essential details, which is at the core of video surveillance and security." The new i-Pro SmartHD WV-SC385 dome camera uses Panasonic UniPhier® LSI chip (H.264 high-profile format) to combine HD video and real-time video streaming at a lower data size. A new 1.3-megapixel MOS image sensor enables high sensitivity and lower power consumption. To increase user system options, the camera is Open Network Video Interface (ONVIF) compliant, while system migration is more easily facilitated with the H.264 or MPEG-4 selectable format. Super Dynamic and Adaptive Black Stretch (ABS) technologies combine to deliver 128x wider dynamic range than conventional cameras. Face Super Dynamic ensures clear images of faces, and a face-detection function detects the position of human faces and sends the information by XML or video. The dome model's industrial grade PTZ mechanism features up to 64 preset positions. Auto-tracking enables automatic pan and tilt to follow a moving subject and keep it in the centre of the image. An auto-flip function enables panning from 0 to 360 degrees. A new "Drag and Zoom" operation and 16-speed user-friendly graphical user interface (GUI) provide enhanced PTZ control. There are 256 speeds available when using the camera with Panasonic's WV-CU950 Universal System Controller (with video management software WV-ASM100). Video Motion Detector (VMD) has four programmable detection areas, 15 steps of sensitivity and 10 steps of detection size. Privacy zone can mask up to eight private areas. Full duplex bi-directional audio allows interactive communication between the camera and monitoring site. An 18x optical zoom combines with a 12x digital zoom to enable 216x zoom (in VGA resolution, 36x extra optical zoom combines with 12x digital zoom for 432x zoom.) Day/night function provides low-light sensitivity of 0.5 lux in colour and 0.06 lux (B/W) at f1.6 (wide). Adaptive Digital Noise Reduction (2D-DNR and 3D-DNR integration) ensures reduced noise and motion blur in various conditions. Progressive scan delivers clear images without motion blur or tearing, and H.264 full-frame-rate video can be recorded using an SD/SDH Memory Card. Panasonic's addition to the i-Pro SmartHD line-up, the WV-SC385 dome camera, covers your back with 360-degree field of view ensuring organizations an unhindered security solution.Add to Compare
Browse Dome Cameras
Dome camera products updated recently
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialized featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialized featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customized recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging A Curious Incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the truck and challenged the driver who seemed surprised. “Hey, you’re not weighing your truck properly.” The driver fumbled for a response before replying, “Sorry, I was on the phone with a friend. I didn’t notice it.” But this security guard had the presence of mind to demand the driver’s phone. The driver was caught off guard and surrendered the phone. The guard then pulled up the most recent incoming/outgoing calls and saw no calls during the last 30 minutes. “I don’t think so.” “You don’t think so what?” The security guard was frank, “You haven’t used this phone in over half an hour.” The truck driver sheepishly acknowledged the fact. It was decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting Preventing Crime As It Happens Knowing the driver was lying, the security guard ordered the truck back on the scale for a correct weighing and advised the driver that he would report the incident. The security guard wrote up his report and handed it off to his supervisor who, in turn, contacted the local corporate investigator. This investigator was soon on the phone with his boss at corporate headquarters on the other side of the world. Together with Security, they decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting. However, once completed, they waited. They would not have to wait long. For the next two months, the waste vendor trucks, filled to the brim with production waste, black-and-white paper and other waste products from the plant, would stop on the scale only for a moment and then drive the front half of the truck off the scale for weighing. It was obvious that the vendor was cheating the company by only paying for half the waste. After two months, it was decided to catch the next cheating driver “en flagrante.” Sure enough, the next truck went half on and half off the scale and was weighed. Security then asked the unsuspecting driver to park his truck and invited him inside the building to talk to a supervisor. The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet Waiting for the driver in a large office was the local investigator and his close friend, the Head of Security. After a difficult interview, the driver admitted to cheating on the scales over a two-year period—he claimed that some of the scale cheating was done at the direction of the vendor’s management, while some of it he did himself by “ripping off” the vendor—which he acknowledged was dangerous. Working With Authorities The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet—they would see what they could do for him later on. In the meantime, Corporate Investigations had received a due diligence report on the vendor company which contained disturbing news—the company and its managers were associated with a countrywide waste management mafia. The report suggested that the vendor had a reputation for thefts and involvement in numerous lawsuits regarding thefts and embezzlement. Shockingly, no prior due diligence had ever been conducted on the vendor. Fortunately, the plant’s finance and audit team had maintained good records over the past 5 years and were able to re-construct the amount of waste going out the plant door and the amounts being claimed and paid for by the vendor. The discrepancy and loss stood at a multi-million dollar figure. After consulting with the local police authorities and company lawyers, it was decided to pursue a civil case against the vendor. Pursuing Legal Action The regional lawyer, the Head of Investigations, the Head of Security and the CFO invited the vendor to discuss the problem. Some of the evidence was shown to the vendor’s CEO who became indignant and, in order to save face, promised to fire the truck drivers and to repay any losses for the last two months. Inter-dependent entities - security, investigations, finance/audit and legal - combined their resources and agendas to form a unified front That was not enough for the company and a protracted legal battle ensued which lasted several years and resulted in the vendor’s paying almost the entire amount in instalments. The vendor was dropped from the contract and internal controls strengthened—the only plant employee dealing with the waste issue left the company and was replaced by two individuals. The plant also began paying more attention to the waste process and less to the production side. Several “lessons learned” come to mind. First, the tripwire came in the person of an astute and well-trained security guard who exhibited some of the best characteristics you want to see from men and women in that profession. The Security Department was also adept at installing the surveillance system and capturing the fraud live on videotape. But a far greater lesson was learned—of what can happen when inter-dependent entities (security, investigations, finance/audit and legal) within a company combine their resources and agendas to form a unified front. The results speak for themselves.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Viking’s attractive E-series entry phones are now able to utilize powerful features available on Panasonic door phone station cards. “Customers can utilize the features offered on a Panasonic door card with a reliable Viking entry phone.” – Joanne Minke, Viking Electronics Product Specialist. Replace Panasonic door phone models KX-T30865 and KX-T7775 by using the PAN-1A and one of Viking’s E-Series entry phones. Simply connect the PAN-1A between the Panasonic door phone/door opener card and your E-Series phone of choice. The PAN-1A can also be used with non-Viking entry phones designed to work on analog extension/FXS ports. Color Video Cameras And Proximity Readers Use the PAN-1A for applications where a Viking Electronics entry phone is preferred, in applications demanding increased reliability, and applications where a more attractive entry phone is desired. Viking’s E-series entry phones are available in multiple colors, chassis and sizes. Surface and flush mount options are available. Additional features such as color video cameras and proximity readers are available for select models. Each E-series entry phone is available with Viking’s Enhanced Weather Protection (EWP) option for increased weather resistance and lifespan in harsh or exposed environments.
A rapid string of merger and acquisition (M&A) transactions as 2018 passed into 2019 suggests the physical security industry may be on the verge of a busy year of companies buying other companies. Observers have noted a large amount of investment capital currently available to be invested in security M&A, and plenty of entrepreneurial companies are looking to be acquired. Joe Grillo, CEO of ACRE, previously hinted at upcoming M&A activity for his company by the end of 2018, foreshadowing ACRE’s late-year announcement to acquire access control company Open Options, Addison, Texas.The VaaS cloud-based image capture platform includes fixed and mobile license plate reader cameras driven by machine learning Just days later, in the midst of the holiday season, Qognify announced its plan to acquire On-Net Surveillance Systems Inc. (OnSSI) and sister company SeeTec GmbH. Then came an even larger announcement: Motorola has acquired VaaS International Holdings Inc., a data and image analytics company for $445 million. The VaaS cloud-based image capture and analysis platform includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. Most recently, ADT announced yet another acquisition, Advanced Cabling Systems, a technology integration company in the South, thus continuing consolidation on the integration side of the business. There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019 Continuation Of The Trend In the case of the Qognify and Motorola deals, Jon Cropley, Principal Analyst, Video Surveillance & Security Services, IHS Global Limited, sees them as the next chapter in an M&A trend going back several years. “I think this is a continuation of what we have been seeing in recent years of video surveillance software vendors being acquired,” he says.In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features" “In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features and are looking at software to offer unique competitive advantages.” In short, he sees it as a continuation of a trend that previously saw Canon acquiring Milestone Systems and Briefcam, Panasonic acquiring Video Insight and Tyco acquiring Exacq. “There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019,” adds Cropley. “However, a spree of large-scale mergers and acquisitions is not expected.” Memoori, another market research firm, forecasts that the value of acquisitions could actually decline marginally in 2019 in value terms but increase in number. This observation is based on Memoori’s charting of physical security deals over the last 18 years. Jim McHale, Managing Director of Memoori, says there have been four cycles of increase and decline in activity, often exaggerated by billion dollar deals in one year such as the merger of Johnson Controls and Tyco of $165Bn in 2016. Access control when combined with identity management is punching well above its weight, and this trend has continued Access Control To Open Systems Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead“It may be too early to make judgements on the future based on the last four weeks, but there are some interesting points that can be made when compared with our 2018 analysis,” says McHale. “Access control when combined with identity management is punching well above its weight, and this trend has continued. "Acre has been a major contributor and has completed some 10 acquisitions. In general, the access control business has been slow to move to open systems, and hopefully we can expect this trend toward openness to continue as it will give additional growth to the business.” For more commentary from Memoori, see their report “Major Trends in the Global Access Control Market 2018”. Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead. While past trends may provide a glimpse of what’s coming, there are always new variables. It’s a sure bet the overall trend toward consolidation will continue but predicting the pace and timing of individual transactions is almost impossible. In any case, it will be interesting to watch how 2019 unfolds on the M&A front, among other factors in a changing industry.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
OSDP Is The Strongest Access Control For Your BusinessDownload
Preparing Your Organization With Quality Situational AwarenessDownload
Is Your Access Control As Effective As You Think?Download
- Sony 4K Security Cameras Are The ‘Intelligent Eyes’ At Amsterdam’s Iconic EDGE Olympic
- Belgian Police Install High-End Full HD Sony 4K Surveillance Cameras To Secure Streets And Fight Crime In Lokeren
- TCA Installs Panasonic CCTV Cameras With ClearSight Coating, Saving Thousands Of Euros
- Hanwha Techwin’s Wisenet cameras and NVRs provides safety for patients at the Norfolk and Suffolk NHS Foundation Trust