AMAG Network / IP Cameras(9)
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), Network, 0.001 lux, Auto Iris, 12 V DC, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 460 mA, 520, 144 x 121 x 100, 0 ~ 50 C (32 ~ 122 F), 0 ~ 85, HDAdd to Compare
1/4 inch, Colour / Monochrome, 1280 x 720 resolution, Digital (DSP), Network, 0.1 lux, Auto Iris, 12 V DC, Motion Activated, 2.7, 1280 x 720, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SSH, SNMP v2/v3, 400 mA, 142, 64 x 108 x 40, 0 ~ 40 C (32 ~ 104 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), Infrared, 0 lux, Auto Iris, 12 V DC, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 1.5 A, 1,500, 83 x 82 x 194, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), Network, 0.001 lux, 12 V DC, Motion Activated, 3.1 ~ 8, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 350 mA, 500, 71 x 64 x 140, 0 ~ 50 C (32 ~ 122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), Network, 0.001 lux, Auto Iris, 12 V DC, 24 V AC, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Zoom, H.264, MJPEG, PTZ, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 800 mA, 1,200, 165 x 135 x 100, 0 ~ 45 C (32 ~ 113 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), Infrared, 0 lux, Auto Iris, 12 V DC, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, SOCK, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 21.6 W, 1,200, 155 x 129 x 100, IP66, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 2 MP resolution, Digital (DSP), PTZ, 0.001 lux, 24 V AC, Motion Activated, 4.45 ~ 89, Wide Dynamic Range, 1920 x 1080, 30 fps, Back Light Compensation, 1/1 ~ 1/10,000 s, > 50, Mini or Compact, Zoom, BNC Connector, H.264, MJPEG, PTZ, 21 W, 2,100, 180 x 240, 0 ~ 50 C (32 ~ 122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 1920 x 1080 resolution, Digital (DSP), Network, 0.001 lux, Auto Iris, 12 V DC, 24 V AC, Motion Activated, 3 ~ 9, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, Auto Gain Control, White Balance, Mini or Compact, Zoom, H.264, MJPEG, PTZ, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SNMP v2/v3, 1.5 A, 1,200, 154 x 130 x 100, IP66, -20 ~ +50 C (-4 ~ +122 F), 0 ~ 85, HDAdd to Compare
1/3 inch, Colour / Monochrome, 2 MP resolution, Digital (DSP), PTZ, 0.001 lux, 24 V AC, Motion Activated, 4.45 ~ 89, Wide Dynamic Range, 1920 x 1080, 30 fps, Inclusion DVR/ Web Server, Back Light Compensation, 1/1 ~ 1/10,000 s, > 50, Zoom, BNC Connector, H.264, MPEG, PTZ, 10 / 100 Base-T, TCP/IP, UDP/IP, HTTP, RTSP, RTCP, RTP/UDP, RTP/TCP, SNTP, mDNS, UPnP, SMTP, IGMP, DHCP, DDNS, SSL v2/v3, IEEE 802.1X, SSH, SNMP v2/v3, 53 W, 4,600, 248 x 309, IP66, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 85, HDAdd to Compare
Browse Network / IP Cameras
IP camera products updated recently
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organization’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The Next Wave In IP Technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analog-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analog audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial Intelligence: Hype Vs. Reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organization’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting With The Right Partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimize waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimize waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labor, fair wages and sourcing minerals from countries in armed conflict. Go In With A Plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
AMAG Technology hosted its annual Security Engineering Symposium in Miami, Florida, February 15-18, 2019 at the Trump National Doral Miami. Eighty end users, consultants and integrators were in attendance. Guests were treated to two days of interactive presentations with thought leaders in compliance, AI, edge technology, insider threat, and open technologies and were taught how to apply what it means to them to understand how to utilize the right solutions to mitigate risks, ensure compliance and save money. AMAG Technology President, Kurt Takahashi and Director of Business Development, Kami Dukes opened the conference by welcoming attendees and introducing honored guests and AMAG staff. Chief Operating Officer, Howard Johnson and Vice President of Products and Partner Programs, Jason Schimpf presented Your Voice, Our Vision, and discussed AMAG’s vision for the future which is based on customer feedback and the technology innovation needed to meet today’s threats. Discussing Security Trends Our goal this year was to change and improve the format to provide digestible, useable content that was valuable to our attendees"A Platinum panel based on the theme, Achieve More Together, discussed security trends, customer needs and how best to move forward together to be successful. Two TED style talks featured Open Ideas with Dukes and Senior Director of Global Sales, Justin Wilmas and People Within with Business Development Manager, Dan Bissmeyer. “Our goal this year was to change and improve the format to provide digestible, useable content that was valuable to our attendees, and I believe we met that goal,” said Dukes. “Our diverse audience inspired impactful discussions surrounding topics that affect vertical markets dealing with compliance challenges, and I am proud to announce that together we raised nearly $9,500.00 for St. Jude Children’s Hospital.” Integrating Access Control With Video “AMAG hosted a first-class event that provided the opportunity to network with AMAG, as well as many end users and vendors," said Salt Lake City Police Department Captain, Scott Teerlink. "The format allowed for much discussion not only about the Symmetry solution, but with how to better integrate access control with video, audio, and other innovative solutions to improve our site security while simplifying and reducing time needed to complete the critical tasks necessary to ensure our facilities are secure. “I left with a better understanding about AMAG, the Symmetry solution and what's new in the security industry. Most importantly, I met outstanding people that will be a tremendous asset as we work to adapt and evolve our systems to best meet our changing environment and needs." Building Relationships With Security Professionals The Security Engineering Symposium provided a wonderful opportunity to network and build relationships with fellow security professionals"Ten certified technology partners worked together to deliver theme-based presentations to attendees. Platinum Level sponsors, ASSA ABLOY and Vingtor Stentofon presented Living on the Edge. Gold level sponsors Axis Communications and Salient Systems presented Take Tech to the Biz. Gold sponsors LifeSafety Power and Winsted presented Automation & Compliance. Silver sponsors shared a breakout session and included Idemia, IRIS ID, LiveSafe and Wavelynx. "The Security Engineering Symposium provided a wonderful opportunity to network and build relationships with fellow security professionals," said Jorge Gomez PE, RCDD, Managing Member/Project Engineer, J&A Engineering Consultants. "The event revitalized me and renewed my excitement about the security industry." During the closing banquet, a representative from St. Jude’s Research Hospital presented about the mission and advances St. Jude’s is making in pediatric cancer research. Our generous SES19 sponsors and attendees together raised $4,728.00, which was matched by AMAG for a record setting total of $9,456.00! “We are so thankful to our integrators, consultants, partners and end users for their generosity, and are thrilled to donate such a large sum to St. Jude,” said Dukes.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilizing a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organizational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organization, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organization's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organization’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organization in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The Path Forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organization’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring Success A risk-based approach aligns the security mission with the organization’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organization is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining Risks And Vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk. The approach puts the security risk decisions in the hands of the ones impacted by those risksAnd it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
OSDP Is The Strongest Access Control For Your BusinessDownload
Preparing Your Organization With Quality Situational AwarenessDownload
Is Your Access Control As Effective As You Think?Download
- OpenView Upgrades Video Surveillance At Cardiff Airport With HD CCTV Security
- Hikvision Secures Dundee Aqua Park With Thermal Video Solution
- 3xLOGIC Partners With Sonitrol Of Fort Lauderdale To Upgrade Security System For JASF’s JA World
- Sony 4K Security Cameras Are The ‘Intelligent Eyes’ At Amsterdam’s Iconic EDGE Olympic