Videotec Dome Cameras(10)
1/4 inch, Colour / Monochrome, 550 TVL resolution, PTZ, 0.1 lux, Indoor/Outdoor, Digital (DSP), 230 V AC, Back Light Compensation, White Balance, > 50, PAL, NTSC, Built-in IR LED, x36, 40 W, 660 x 330 x 570, 16,500, -40 ~ +60 C (-40 ~ +140 F), IP66Add to Compare
1/4 inch, Colour / Monochrome, 550 TVL TVL resolution, PTZ, 0.1 lux, Indoor/Outdoor, Digital (DSP), 230 V AC, MPEG-4/ MJPEG, Back Light Compensation, White Balance, >50, PAl, NTSC, 75 Ohm, 1 Vpp, x36, 27,000, -40 ~ +60 C (-40 ~ +140 F)Add to Compare
Colour / Monochrome, 320 x 256 TVL resolution, PTZ, 0.1 ~ 200 o/ sec pan speed, Indoor/Outdoor, Digital (DSP), 0.1 ~ 200 o/ sec tilt speed, 230 V AC, 35 mm, PAL, NTSC, x36, 30 fps, 40 W, 1,250, -40 ~ +60 C (-40 ~ +140 F), IP66Add to Compare
Colour / Monochrome, HD, PTZ, 0.1 ~ 100 o/ sec pan speed, Digital (DSP), 0.1 ~ 100 o/ sec tilt speed, H.264/AVC, MJPEG, Auto Gain Control, 1/1 ~ 1/10,000s, x30, TCP/IPv4-IPv6, UDP/IPv4-IPv6, HTTP, NTP, DHCP, WS-DISCOVERY, QoS, IGMP (Multicast), 60fps, 120 W, 27,000, -40 ~ +60 C (-40 ~ +140 F), IP66Add to Compare
Browse Dome Cameras
Dome camera products updated recently
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
The ease of getting from point A to point B, the effective movement of goods and services, and the flexibility and integration of various modes of transportation are key aspects of mobility today. Smart Mobility has been a key theme in the transportation industry for a while. The idea is to keep traffic flowing and help people to get where they need to be, in a smarter way. To this end, industry players are now innovating and introducing advanced technologies and solutions. Examples include intelligent traffic management systems, free-flow tolls, autonomous driving, smart location solutions, and more. At the same time, traffic congestion, aging infrastructure, rapid urbanization, and increasing sustainability demands are also intensifying the need for smart mobility solutions. One way to overcome these obstacles is to use intelligent video surveillance technology for improved traffic management, making the roads safer and more efficient for every user, while also reducing emissions. Perceptive intersections Relying on intelligent video analytics, traffic video cameras identify traffic build ups at intersections by counting numbers of vehicles crossing an intersection and detecting their speed, while also counting the number of vehicles queueing in real-time. Aggregated data informs the system when to switch traffic lights to red or green. Intelligent optimization for traffic signals ensures more effective traffic flow.Aggregated data informs the system when to switch traffic lights to red or green The benefits? Improved safety on the roadways; intersection reconstruction can be avoided; drivers can be advised about the speed of their route, forecasted by traffic signals; reduced wait times and stress for commuters; reduction of harmful emissions; and positive impact on public satisfaction. Road safety Traffic incidents can be disastrous, not merely for causing congestion on the roads but sometimes far worse – resulting in injuries and even fatalities. These incidents have many causes, not the least of which is drivers willfully violating traffic laws. Video technology can aid in detecting all kinds of events – for example, illegal parking, running a red light, wrong-way driving, speeding, and making illegal U-turns can all be detected by smart camera technology. By using deep learning technology, cameras can recognize these events and traffic authorities can be immediately notified and take necessary actions even before traffic incidents occur. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally. Furthermore, ticketing systems can be incorporated to further regulate driving behaviors. Benefits here include incident prevention, better driver performance, and increased safety on the roads and streets, to name just a few. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally Public information Sharing information is key to keeping city drivers and travelers informed. Intelligent communication about warnings and updates helps everyone save time, avoid frustration, and simplify everyday mobility. This can be done via traffic guidance screens displayed at highly visible locationsThis can be done via traffic guidance screens displayed at highly visible locations, such as congested areas, transportation hubs, shopping malls, and city plazas – or even at your fingertips on your favorite mobile apps! Traffic video cameras generate real-time data of traffic flow and incidents, sending it to a central platform to further fuse with data from third-party systems such as radar and GPS systems. They also disseminate traffic information, including traffic status, warning and advisory notices, as well as parking status. The benefits are improved public awareness of traffic information, improved travel convenience, overall enhancement of mobility in the city, and more. The Hikvision practice Hikvision has accumulated sophisticated experience in traffic management both at home and abroad. Product lines offer versatile solutions to resolve multitudes of problems in urban traffic management, traffic incident management, highway management, and more. Going deeper, it’s essential to note that efficient signal control management is dependent on the quality of traffic data, system algorithms, and the hardware devices in use; it is also closely related to the mobile environment, such as road conditions, historical traffic conditions, and urban infrastructure. Because of this, no single solution solves traffic congestion everywhere. Hikvision believes that only by working closely with city authorities, public safety organizations, consultants, even academia and other relevant stakeholders, can applications and operational processes be developed to achieve the best possible outcomes. The possibilities for traffic video data are endless, especially now that it can employ artificial intelligence for advanced functionality. Harnessing its power will make all the difference, but the ultimate goal remains the same: safe and smooth traffic, smart mobility, and improved quality of human life.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Videotec is expanding its range of explosion-proof products with the new MBA communication box, which has been designed for optimal installation of Maximus, IP or analog cameras in potentially explosive environments. Much more than a simple junction box, this communication box provides low voltage local power and allows a fast Ethernet connection, thanks to the integrated Ethernet switch that has three RJ45 ports and an SFP port for fiber optic connection. The type of SFP module can be chosen according to the installation requirements. The internal spaces are designed to make access to cables easier and to increase user-friendliness when it comes to connection procedures. The internal circuitry also allows a bypass of analog video signals, and all inputs/outputs available across MAXIMUS Videotec products. Epoxy-powder protective coating MBA has been designed to integrate and work exclusively with the MAXIMUS range of Videotec products, and so that it can connect a PTZ camera to the associated washing kit (or two fixed cameras to their washing kits). MBA is made of marine-grade aluminum that has an epoxy-powder protective coating. This means that the unit can operate in corrosive areas, such as industrial or marine environments. MBA is the complete and competitive solution for professional installation of the Videotec MAXIMUS range of explosion-proof products.
Videotec is launching NVX, an IP FULL HD super low-light camera with high corrosion resistance. This camera incorporates the DELUX imaging and encoding technology for recording incredibly clear color video day or night. Its extremely sensitive light sensor works with the DELUX technology to provide high color rendering and maximum noise reduction in very low light conditions of 0.006 lux, or 0.0006 lux in black and white. Video images can be transmitted via network with H.264/AVC, MPEG4, MJPEG or JPEG compression, and it’s possible to have up to 3 simultaneous and independent Full HD video streams. The NVX external housing is made entirely from AISI316L stainless steel and has a compact and lightweight design that, along with the rapid connectors, helps installation and maintenance. Exceptional corrosion resistance The wiper and the modular bracket for wall/ceiling/parapet mounting come standard. NVX has exceptional corrosion resistance, a wide operational temperature range and IP66/IP67/IP68/IP69 protection. These features mean it is well suited to marine and industrial areas; such as the food industry and rail and motorway tunnels applications.
Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cybersecurity. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cybersecurity. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railroad. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cybersecurity certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cybersecurity at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organization: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalog. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cybersecurity in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimize the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cybersecurity. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analog to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimize expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload
Houston’s BBVA Compass Stadium Upgrades Security With Salient Systems VMS And Axis Communication Cameras
- Revader Security Provides Redeployable CCTV Cameras To Enhance Video Monitoring For Sussex Police
- Hikvision To Provide Intelligent AI-Based Technology To Safeguard AQAAR’s Construction Projects
- Houston’s BBVA Compass Stadium Upgrades Security With Salient Systems VMS And Axis Communication Cameras
- Salient Systems VMS Integration With Honeywell’s ProWatch Access Control Platform Secure SMG/The Moscone Center