Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer panoramic cameras. I recently spoke with Jeff Whitney, Arecont Vision’s Director of Marketing, on the current market for panoramic cameras, and also about some other hot topics – from cybersecurity to making the installer’s job easier. Where do you see the category of multi-sensor panoramic cameras going from here, and how does Arecont Vision continue to differentiate itself as the market becomes more crowded?

Jeff Whitney: When Arecont Vision launched the industry’s first multi-sensor panoramic cameras, we knew we had something that would disrupt the industry. A single panoramic camera can cover 180 or 360 degrees for outstanding video coverage, indoors and out, enhancing situational awareness, and reducing the number of required cameras all at the same time. Legacy PTZ technology can’t compete with that, being expensive, including many moving parts that can fail and require maintenance, and unable to cover the entire scene uninterrupted.

It was a lonely effort to bring that message to customers 10 years ago, but many manufacturers have now copied the idea – and in some cases our designs – with varying levels of success. Competition is always good for any industry, including security. Other vendors are now picking up our message about the benefits of multi-sensor cameras, spreading the word across the industry with a louder voice than one company alone can deliver.

"Other vendors are now picking
up our message about the
benefits of multi-sensor cameras,
spreading the word across the
industry with a louder voice than
one company alone can deliver"

Arecont Vision remains the leader in this space and remains easy to differentiate from all the copies. We are in our 5th generation of the SurroundVideo 180- and 360-degree four-sensor panoramic camera series, with multiple generations of new technologies and features incorporated into each series. Our competitors remain early-generation products.

In 2014 we ramped up the SurroundVideo family even further, introducing the multi-sensor omnidirectional family of products. SurroundVideo Omni offers four independent sensors on a 360-degree track, which can be pointed individually in just about any desired direction. This makes an Omni ideal for intersections –  indoor hallways or outside covering streets –  or any open space indoors or out that needs to cover an area for enhanced situational awareness. In 2015 we introduced SurroundVideo Omni G2, which adds remote focus sensors. End user customers want great images and dependable systems, but integrators want systems that are easier to install. How are Arecont Vision’s product designs evolving to make the integrator’s job easier?

JW: All of Arecont Vision’s camera families offer remote focus capability, and where appropriate, remote zoom as well. These features can reduce dramatically the integrator’s time at the job site. They can hang the camera quickly, point the sensor in the general area to be covered and then remotely focus the camera at their leisure over the network. The installer no longer has to balance a laptop or tablet computer while perched atop a ladder or lift in order to focus a camera.

Arecont Vision also bases our megapixel camera designs on our FPGA (field programmable gate array) technology. We load our firmware, with all the options and features included in the camera, onto the FPGA, instead of having to add additional circuit boards and components that take up space. The result is that our cameras are typically much more compact that those of our competitors, and easier for installers to handle. When we combine that with multiple generations of experience in reducing camera size, cameras like our SurroundVideo Omni G2 are much smaller than our closest copies made by competitors, and while all our cameras are quite rugged, they are often lighter than those of our competitors as well.

"Arecont Vision’s camera
families offer remote focus
capability, and where
appropriate, remote zoom
as well"

Our efforts to help the integrator have also focused on our designs. We are using more magnets in our dome camera designs, including our MegaDome® 4K series. The installer screws a base plate in place, then slips on the rest of the camera enclosure which is held in place magnetically while he screws it in. Similarly, the dome is held in place magnetically until screwed down. While this may sound simple, the light weight of the camera, the remote focus capability, and the use of magnets during installation all can dramatically simplify and speed up installation for the integrator. This allows less time to be spent at the job site, reducing labor costs. Cybersecurity is suddenly a big issue in our market. What is Arecont Vision’s take on cybersecurity, and how are you making sure your cameras are safe from cyber-threats? What are you hearing from customers about their need for cybersecurity?

Arecont Vision megapixel cameras are uniquely protected from many types of cyberattack. We have incorporated features like 16-character ASCII passwords into all our recent designs and provide education of cybersecurity risks and best practices through our Arecont Vision University free of charge to our systems integrators. We also go much further.

The September 2016 Distributed Denial of Service (DDoS) attack on French hosting firm OHV and on has been reported to have used over 140,000 network cameras and DVRs that were turned into robots (or bots). That was followed on Oct. 21, 2016, by a major DDoS attack that lasted for 11 hours and is estimated to have resulted in 100 million U.S. dollars of lost revenue.

Arecont Vision cameras were not used in any of these cyberattacks. The reason is the FPGA (field programmable gate array) chip at the heart of all our cameras. This is a custom-designed integrated circuit (IC) on which we run our proprietary firmware “bare metal.” We do not use common operating systems like Linux, which is commonly used in network cameras, DVRs, NVRs, computers, and many other electronic devices. This is an important point, because operating systems like Linux have security vulnerabilities that can be used to gain root access to the device and make a cyberattack possible.

Operating systems like Linux
have security vulnerabilities
that can be used to gain root
access to the device and make
a cyberattack possible

Should a hacker gain access to one of our cameras or somehow obtain the ID and password, they could access the camera just like any other device. They could access the setup menu, and make adjustments or shut the camera down. However, without a common operating system like Linux, the attempt would fail to turn the camera into a bot or launch cybersecurity attacks on other cameras or devices across the network and the Internet. Our cameras are best at combining ease of installation and use while securing them from becoming a participant in cybersecurity risks.

The industry overall needs to continue to grow its cybersecurity awareness. Cameras from many manufacturers need to be redesigned to eliminate the risk of being used in cyberattacks for the benefit of those well beyond the security and surveillance industry. Arecont Vision has embarked on a program to increase cybersecurity for all of our own camera designs, and I have become a member of the Security Industry Association’s Cybersecurity Advisory Board specifically to help educate and move the industry forward in awareness and adoption of best standards. How is Arecont Vision responding to the trend toward commoditization of video cameras?

JW: Analog and standard resolution IP cameras continue to play a role in the consumer and low-end professional surveillance market. There is risk of commoditization in those areas as price rules over features and capability.

The mid- to high-end professional surveillance market remains quite different. There is still considerable growth potential across the board for megapixel cameras. The technology is continuing to be developed, improved, and upgraded, and thus commoditization really only rears its head in the lower range of camera offerings around 2-3MP based on price. Customers in this space focus on price and “good enough” cameras that often would not match the quality of more expensive competitive versions.

The reality of lower-priced cameras only becomes clear when an integrator or customer takes the time to evaluate cameras side-by-side. Then it is usually quite evident that cameras that claim to offer the same resolution don’t always offer similar image clarity, correct colors, low light performance, or any of a host of other issues.

Arecont Vision continues to invest heavily in R&D to add new features and capabilities, while coming up with new designs. We believe our products’ performance, reliability, and features will continue to make a difference in the marketplace.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, &

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

What Are The Positive And Negative Effects Of COVID-19 To Security?
What Are The Positive And Negative Effects Of COVID-19 To Security?

The COVID-19 global pandemic had a life-changing impact on all of us in 2020, including a multi-faceted jolt on the physical security industry. With the benefit of hindsight, we can now see more clearly the exact nature and extent of that impact. And it’s not over yet: The pandemic will continue to be top-of-mind in 2021. We asked this week’s Expert Panel Roundtable: What have been the positive and negative effects of Covid-19 on the physical security industry in 2020? What impact will it have on 2021?

Maximising Supermarket Safety With Real-time Surveillance Solutions
Maximising Supermarket Safety With Real-time Surveillance Solutions

Supermarket employees have been the hidden key workers of the past year, keeping shelves stocked and queues under control as panic buying gripped the nation. As a result of being expected to enforce face covering and social distancing regulations, they also been asked to act as de-facto security guards alongside their existing duties. This is problematic as many employees have never had to deal with this kind of responsibility before, let alone received any conflict de-escalation training. In order to maintain the safety and security of their staff retailers must take additional steps to uphold their duty of care, with the NPCC recently specifying that it is the responsibility of retailers ‘to manage entry to their stores and compliance with the law while customers are inside’. Supermarkets in particular need to be aware of this requirement, as the big four recently announced that their employees would now be challenging customers shopping in groups and those not wearing masks. Verbal abuse from the public Crime against retail employees has already been a major issue over the course of the pandemic, confirmed by research from the Union of Shop, Distributive and Allied Workers that found 90% of retail staff in the UK experienced verbal abuse last year. The Co-op has recently been vocal about the effects of the pandemic and lockdown-related frustrations on its employees.90% of retail staff in the UK experienced verbal abuse last year The supermarket reported a 140% increase in crime within its stores over the past year, with many of the 200,000 cases related to verbal and physical abuse experienced by employees. Jo Whitfield, Co-op Food chief executive, confirmed that the number of issues has already increased drastically as a result of staff enforcing COVID-secure guidelines. So, what steps must retailers take to ensure their duty of care remains intact as employees take on new enforcement responsibilities? Introducing real-time surveillance technology to support security guards and shop floor employees alike is vital. Bolstering front line defences Security guards posted at supermarket entrances are the first line of defense against shoppers determined to break the rules. However, they are now being pulled in multiple directions with queues to monitor and occupancy to manually keep track of, along with the usual security alarms to respond to. With one person usually posted at the entrance at any one time it’s simply impossible to have eyes everywhere, which is where automated video surveillance comes in. COVID-specific technologies, such as mask detection and occupancy management systems, are now the golden bullet to retail safety and security.Mask detection and occupancy management surveillance tools can automatically alert a shopper Mask detection and occupancy management surveillance tools can automatically alert a shopper whether or not they are allowed to enter the store on their approach to the door. The system surveys the person and a screen will automatically display different instructions depending on the situation: whether they must put a mask on before they enter, wait until capacity is low enough to enable social distancing or, if the previous criteria are fulfilled, that they are free to enter. COVID-secure safety This stand-off technology minimizes the need for contact between security personnel and shoppers, allowing security guards to complete their usual duties, safe in the knowledge that the store is being managed in a COVID-secure way. With a hands-off approach enabled by surveillance technology, the potential for tense confrontation is greatly diminished as customers will usually comply to the reminder shown to them and put on a mask or wait without further prompting from staff. With security personnel able to better focus their attention on the stubborn rule-breakers,It is crucial that retailers choose a solution embedded in real-time connectivity this responsibility will no longer land with staff on the shop floor who are often ill-equipped to deal with this situation. It is crucial that retailers choose a solution embedded in real-time connectivity that will allow all store entrances to be screened simultaneously. Nobody can be in multiple places at once, but this connectivity allows alerts to be streamed instantly to any connected device that can be monitored by just one employee, meaning they can review the alerts that require their attention without needing to be physically present or re-tasked away from their day-to-day duties. Instant reassurance with body worn tech As a customer-facing role, there can be no guarantee that shop workers will never experience a potentially violent confrontation with a customer, which is where the presence of live streaming body worn cameras can help. While they may not always be trained to de-escalate a risky situation, being able to discreetly call for assistance can provide the reassurance employees need to feel safe and supported at all times. If an employee asks a customer to put a mask on while they’re in the store or step back from another shopper and the situation turns abusive – verbally or physically – a live streaming-enabled body worn camera can be triggered to stream a live audio and video feed back to a central control room manned by trained security personnel.A live streaming-enabled body worn camera can be triggered This real-time footage gives security staff exceptional situational awareness, allowing them to fully assess the situation and decide on the best course of action to support the employee in distress, whether that is going to the scene to diffuse the situation or contacting the police in more serious circumstances. Bolstering front line security This goes one step further than record-only body worn cameras, the capabilities of which these next generation devices match and exceed. Record-only cameras are well-suited to provide after-the-fact evidence if a customer interaction turns sour, but they do little to provide reassurance to out of depth employees in the moment. The duty of care grocery retailers must provide to their employees has never been more important, with staff taking on new mask and social distancing enforcement responsibilities and managing interactions with frustrated customers. Bolstering front line security and giving staff extra reassurances with the introduction of real-time video surveillance technology is a crucial step for retailers striving to keep employees and shoppers safe during these challenging times.