Pelco Network / IP Cameras(20)
1/2 inch, Colour / Monochrome, 540 TVL resolution, Digital (DSP), 0.00015 lux, Auto Iris, PTZ, 3.3 ~ 119, 752 x 582, 1/1.5 ~ 1/30,000s, >50 dB, Internal/AC line lock, PAL, Zoom, 1 Vp-p, 75 ohms, H.264, MJPEG, MJPEG, PTZ, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, SNMP, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, mDNS (Bonjour®), and 802.1x (EAP), Microsoft® Windows® XP, Windows Vista®, Windows 7, or Mac® OS X 10.4 (or later), Internet Explorer® 7.0 (or later) or Mozilla® Firefox® 3.0 (or later)Add to Compare
1/3 inch, True Day / Night, 1.3MP resolution, Digital (DSP), 0 lux, Auto Iris, 12 V DC/PoE, Motion Activated, 8 ~ 32, 1280 X 960, 30fps, Inclusion DVR/ Web Server, Auto Gain Control, Zoom, H.264/MPEG4/MJPEG, PTZ, 12 W, IP66, -40 ~ +60 C (-40 ~ +140 F), < 95Add to Compare
1/3 inch, Colour / Monochrome, 5MP resolution, Digital (DSP), 0.30 lux, Auto Iris, PoE, Megapixel, CS mount, Motion Activated, 12fps, White Balance, 1/5 ~ 1/10,000s, 65, H.264, MJPEG, RJ-45 connector for 100Base-TX, CP/IP, UDP, ICMP, IPv4, SNMP v2c/v3, HTTP, HTTPS, SSL, SSH, SMTP, FTP, RTSP, UPnP, DNS, NTP, RTP, RTCP, LDAP,Add to Compare
1/3 inch, Colour / Monochrome, 3MP resolution, Digital (DSP), 0.30 lux, Auto Iris, PoE, Megapixel, CS mount, Motion Activated, 20fps, White Balance, 1/5 ~ 1/10,000s, 65, H.264, MJPEG, RJ-45 connector for 100Base-TX, TCP/IP, UDP, ICMP, IPv4, SNMP v2c/v3, HTTP, HTTPS, SSL, SSH, SMTP, FTP, RTSP, UPnP, DNS, NTP, RTP, RTCP, LDAP,Add to Compare
1/3 inch, Colour / Monochrome, 2MP resolution, Digital (DSP), 0.30 lux, Auto Iris, PoE, Megapixel, CS mount, Motion Activated, 30fps, White Balance, 1/5 ~ 1/10,000s, 65, H.264, MJPEG, RJ-45 connector for 100Base-TX, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, IPv6, SNMP v2c/v3, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, ARP, ICMP, and 802.1x (EAP),Add to Compare
1/3 inch, Colour / Monochrome, 3MP resolution, Digital (DSP), 0.0013 lux, Auto Iris, PoE, Network, CS mount, Motion Activated, Wide Dynamic Range, 2048 x 1536, 30fps, White Balance, 1 ~ 1/77,000s, >60, H.264, MJPEG, RJ-45 connector for 100Base-TX, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, IPv6, SNMP v2c/v3, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, ARP, ICMP, and 802.1x (EAP), 9 W, 520, 127 x 197 x 127, IP66, -10 ~ +50 C (14 ~ 122 F), Microsoft ® Windows ® 7 (32- and 64-bit), or Window Vista ® ; or Mac ® OS X 10.4 (or later), Internet Explorer ® 7.0 (or later) or Mozilla ® Firefox ® 3.5 (or later); Internet Explorer 8.0 (or later) is recommended for configuring analytics, 20 ~ 80, HDAdd to Compare
1/3 inch, Colour / Monochrome, 2 MP resolution, Digital (DSP), 0.0013 lux, Auto Iris, PoE, Network, CS mount, Motion Activated, Wide Dynamic Range, 1920 x 1080, 30fps, White Balance, 1 ~ 1/77,000s, >60, H.264, MJPEG, RJ-45 connector for 100Base-TX, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, IPv6, SNMP v2c/v3, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, ARP, ICMP, and 802.1x (EAP), 9 W, 520, 127 x 197 x 127, IP66, -10 ~ +50 C (14 ~ 122 F), Microsoft ® Windows ® 7 (32- and 64-bit), or Window Vista ® ; or Mac ® OS X 10.4 (or later), Internet Explorer ® 7.0 (or later) or Mozilla ® Firefox ® 3.5 (or later); Internet Explorer 8.0 (or later) is recommended for configuring analytics, 20 ~ 80, HDAdd to Compare
Monochrome, 640 x 480 resolution, Digital (DSP), 24 V AC, Thermal, Motion Activated, 50 mm, 640 x 480, 30 fps, PAL, Mini or Compact, H.264 / MJPEG, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, SNMP, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, and 802.1x (EAP), 3,300, -40 ~ +50 C(-40 ~ +122 F)Add to Compare
Monochrome, 384 x 288 resolution, Digital (DSP), 24 V AC, Thermal, Motion Activated, 35 mm, 384 x 288, 30 fps, PAL, Mini or Compact, H.264 / MJPEG, RJ-45 connector for 100Base-TX, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, SNMP, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, and 802.1x (EAP) , 3,200, -40 ~ +50 C(-40 ~ +122 F)Add to Compare
Colour / Monochrome, 240 x 184 resolution, Digital (DSP), 24 V AC, Thermal, Motion Activated, 6.3 , 240 x 184, 30 fps, PAL, Mini or Compact, H.264 / MJPEG, RJ-45 connector for 100Base-TX, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, SNMP, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, and 802.1x (EAP), 3,100, -40 ~ +50 C(-40 ~ +122 F)Add to Compare
1/3 inch, Colour / Monochrome, 5 MP resolution, Digital (DSP), 0 lux, 24 V AC, Motion Activated, 3 ~ 9, 12fps, Inclusion DVR/ Web Server, 1/5 ~ 1/10,000s, 65, Zoom, H.264, MJPEG, RJ-45, 100Base-TX, TCP/IP, UDP, ICMP, IPv4, SNMP v2c/v3, HTTP, HTTPS, SSL, SSH, SMTP, FTP, RTSP, UPnP, DNS, NTP, RTP, RTCP, LDAP,Add to Compare
1/3 inch, Colour / Monochrome, 2MP resolution, Digital (DSP), 0.0013 lux, Auto Iris, Direct Drive, PoE, Motion Activated, 3 ~ 9, Wide Dynamic Range, 30fps, White Balance, 1 ~ 1/77,000s, >60, Mini or Compact, Zoom, H.264, MJPEG, PTZ, 100dBase-TX, RJ-45, TCP/IP, UDP/IP (Unicast, Multicast IGMP), UPnP, DNS, DHCP, RTP, RTSP, NTP, IPv4, IPv6, SNMP v2c/v3, QoS, HTTP, HTTPS, LDAP (client), SSH, SSL, SMTP, FTP, ARP, ICMP, and 802.1x (EAP), 8.5 W, 1,200, 222 x 329 x 176, -10 ~ +50 C (14 ~ 122 F), Microsoft ® Windows ® 7 (32- and 64-bit), or Window Vista ® ; or Mac ® OS X 10.4 (or later), Internet Explorer ® 7.0 (or later) or Mozilla ® Firefox ® 3.5 (or later); Internet Explorer 8.0 (or later) is recommended for configuring analytics, 20 ~ 80, HDAdd to Compare
1/3 inch, Colour / Monochrome, 3 MP resolution, Digital (DSP), 0 lux, 24 V AC, Megapixel, Motion Activated, 3 ~ 9, 20fps, 1/5 ~ 1/10,000s, 65, Zoom, H.264, MJPEG, RJ-45, 100Base-TX, TCP/IP, UDP, ICMP, IPv4, SNMP v2c/v3, HTTP, HTTPS, SSL, SSH, SMTP, FTP, RTSP, UPnP, DNS, NTP, RTP, RTCP, LDAP, 1760,Add to Compare
1/3 inch, Colour / Monochrome, 2MP resolution, Digital (DSP), 0 lux, 24 V AC, Megapixel, Motion Activated, 3 ~ 9, 30fps, 1/5 ~ 1/10,000s, 65, Zoom, RJ-45, 100Base-TX, TCP/IP, UDP, ICMP, IPv4, SNMP v2c/v3, HTTP, HTTPS, SSL, SSH, SMTP, FTP, RTSP, UPnP, DNS, NTP, RTP, RTCP, LDAP, 1760, IP66, IK10, -40 ~ +50 C (-40 ~ +122 F), Microsoft ® Internet Explorer ® 8.0 and later, 15 ~ 85Add to Compare
Browse Network / IP Cameras
IP camera products updated recently
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-Store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behavior is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail Banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimize, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalized enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
The Open Security & Safety Alliance (OSSA), an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and building automation space, celebrates its one-year anniversary. Within its first 12 months, OSSA attracted 30+ members ranging from device manufacturers, software developers and system integrators to distributors and system on a chip (SoC) companies – helping lay the groundwork for improved security, safety, building automation and business intelligence solutions. Open security and safety ecosystem We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem" “Through OSSA, we have competing and complementary institutions reaching across aisles and stepping outside of their brands to work together to push our whole industry into a new, more prosperous and efficient direction,” said Johan Jubbega, President, Open Security & Safety Alliance. “We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem comprised of 30+ renown companies, and having a market-changing digital marketplace and first commercially available video security camera offerings underway for year two as the Alliance continues to provide guidance and interpretation of common standards and specifications to promote more intelligent, productive solutions for users.” Operation and maintenance of products Currently, security and safety solutions are fragmented and there is no collaborative approach to systems working together for bigger-picture success. Large amounts of data are left untapped in siloed systems that through cooperation can instead be utilized for better living, safety and security purposes. OSSA’s mission is to work with market players to all start from the same ‘recipe’ when it comes to the development, deployment, operation and maintenance of products, software and services. The Alliance’s vision is that the majority of the security and safety industry works with a common, vendor-agnostic operating system (OS) and IoT infrastructure – and agrees to implement or adhere to common approaches defined for common challenges like data security, privacy, product performance and easy consumption of data across multiple solutions. Collaborative digital marketplace They also started to define the common approaches and establishment of a shared IoT infrastructure This will substantially fuel usability and trust when it comes to security and safety solutions that are built on the foundations set forth by OSSA. From there, companies can differentiate through apps by way of a collaborative digital marketplace – similar to how we all access/download/use applications between an app store and our smart phones and other digital devices. Already within its first year, OSSA member companies created the first common Technology Stack specification including the definition of a common operating system for video security devices. They also started to define the common approaches and establishment of a shared IoT infrastructure, including a digital marketplace. This framework allows the trapped – and mostly unused – data captured by any brand of device to be unleashed and available for good purpose. It also reduces friction when conceiving, deploying and maintaining security and safety devices, systems and settings and inspires innovation by opening the doors to data interpretation and possibilities. This platform revolution that OSSA envisions will benefit everyone involved. Significant outputs from Alliance workgroups Significant outputs from Alliance workgroups over the past 12 months include: Documentation of a common Technology Stack including the definition of a common vendor-agnostic OS. First description of a common market approach to data security and privacy. OSSA member Security and Safety Things GmbH (SAST) realized a first version of its OS as set forth in the common Technology Stack defined by OSSA – enabling the creation of prototype cameras. Together with SAST’s first open app store for security cameras, various innovative applications were showcased this year from ISC West 2019, IFSEC 2019 and GSX 2019. The commercial launch of the platform is planned for Q1 2020. OSSA members fulfilled their first prototype cameras based on the commonly defined Technology Stack and OS, and showcased them throughout 2019 at ISC West, IFSEC and last week from GSX. Change for the betterment of the industry The Open Security & Safety Alliance’s five founding companies – Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ and VIVOTEK Inc – are joined by 25+ other inventive international players that currently comprise the OSSA member roster. The Alliance is designed to include everyone and offers membership levels to meet the needs of companies big or small. Benefits of joining OSSA include access to the Alliance framework and the ability to connect, discuss, influence and collaborate with other Alliance members to steer change for the betterment of the industry.
AMG Systems has been commissioned to help digitise the traffic monitoring system for newly-extended hard shoulder bus lanes on Belfast’s main motorways, to make it more efficient, secure and reliable. A new IP-based CCTV system was being installed as part of the extension project, so the underlying fiber network needed to be upgraded in order to handle the high-grade images being transmitted back to the city’s Traffic Information and Control Center (TICC). The upgrade helps to enhance passenger journeys by improving the quality of real-time information sent to traffic management teams. AMG – Juniper Networks partnership AMG, working with Juniper Networks, a leader in secure, AI-driven networks, brought the IP-driven CCTV project together across numerous government agencies and private construction contractors to create a cost-efficient, robust solution for Belfast’s M1 and M2 motorways. The Northern Ireland Department for Infrastructure (DfI) awarded a tender to Graham Construction to work on the extension of hard shoulder bus lanes along the M1 and M2 motorways, intended to improve journey times and service reliability for bus passengers without affecting general traffic flows. The scheme was designed by DfI consultants Aecom, who also carried out site supervision and project manager roles during construction. The work included the provision of new and upgraded Pan Tilt Zoom IP-based CCTV cameras for traffic monitoring purposes by the Traffic Information and Control Center (TICC) in Belfast. Hikvision PTZ IP video camerasGraham used Hikvision PTZ IP video cameras – installed by Chubb – for traffic monitoring Graham used Hikvision PTZ IP video cameras – installed by Chubb – for traffic monitoring. But connecting them to the Pelco system in use at TICC was not as straightforward as it at first seemed, which is where AMG Systems and Juniper Networks came in. “On each of the two motorways, the existing fiber network had only two spare fibres, so all the images had to be combined onto the two, allowing for a resilient ring,” consultant Jo Hopkins of Highways Consulting says, “meaning that if one fiber broke, the other would be able to transmit all the images. The existing cameras on the network were analog, but we took the opportunity to install digital cameras. This reduces the number of times the images are sampled and converted from analog to digital and back again, which improves the quality of the image.” Connecting IP cameras to Fiber Network Hopkins worked with Graham on the project, and said AMG was asked to provide a reliable, cost-effective means of connecting new cameras onto the existing fiber network, bringing the images back to the Traffic Control Center in Belfast. “The task itself was straightforward, but the integration into an existing live system made the project more complex,” she said. Hopkins and AMG Systems Business Development Director Sara Fisher worked to address the network challenge, which included upgrading from analog to IP cameras for the first time on the Belfast motorways. AMG switches The network design utilizes nine AMG switches on the M1 fibres and 15 switches for the M2 The network design utilizes nine AMG switches on the M1 fibers and 15 switches for the M2. At the TICC control room, there are a further four AMG switches which allow the IP cameras to connect to the existing Pelco monitoring equipment. Fisher explains that the control room network connection was further complicated as the TICC’s existing system called for the use of multi-casting and VLANs, and an existing firewall also had to be factored in. “The most appropriate interface in this case was Layer 3 POE switches from our partner Juniper Networks,” she said. IP video surveillance A DfI TICC representative said: “The joint network design by AMG and Juniper Networks has met the challenge presented to them in upgrading our hard shoulder bus lane cameras from purely analog to IP and has provided a resilient network, intended specifically for the task. AMG’s post-sales service and advice has also proved extremely helpful.”
Managed services provided through the cloud offer multiple advantages for system integrators. These Include: Increased Recurring Monthly Revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier Customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. High Gross Profit Margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They Are Easier To Provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems Can Be Fixed Proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased Valuation Of Business: According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance Of Cloud-Based Solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data Monitoring And Security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electri, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymized, it could also be used by manufacturers to analyze and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The Cloud Software As A Service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. “We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Physical Security Supports A Future-Proof Cyber Security StrategyDownload
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
- March Networks Provides Video Surveillance Solutions At Leon Medical Centers
- Dahua Technology’s Surveillance System Secures Yarmouth Harbor From Thefts
- Airbus’ STYRIS, Vessel Traffic Services Upgrades The Port Of Sydney
- 360 Vision Technology’s Invictus Hybrid PTZ Cameras Deployed At Security Centers International’s Mobile Advanced Safety Tower (MAST)