Illustra Network / IP Cameras(15)
1/4 inch, True Day / Night, 1 MP resolution, Digital (DSP), Megapixel, 0 lux, 12 V DC, 3.6, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, Auto Gain Control, White Balance, 1/3(4) ~ 1/10000s, >50, Mini or Compact, H.264/MJPEG, RJ-45 (10/100Base-T), IPv4/IPv6, HTTP, HTTPS, SSL, TCP/IP, UDP, UPnP, ICMP, IGMP, SNMP, RTSP, RTP, SMTP, NTP, DHCP, DNS, PPPOE, DDNS, FTP, IP Filter, QoS, Bonjour,Add to Compare
1/3 inch, 5 MP resolution, Digital (DSP), Megapixel, 1.2 lux, Direct Drive, PoE, Motion Activated, 1.37, Wall / Ceiling, Wide Dynamic Range, 1936 x 1936, 14 ips, White Balance, Zoom, H.264 / MJPEG, 10/100Base-T, TCP/IP, IPv4, IPv6, TCP, UDP, HTTP, FTP, DHCP, WS-Discovery, DNS, DDNS, RTP, TLS, Unicast, Multicast, NTP, SMTP, WS-Security, < 12.95 W, 750, -10 ~ +45 C (14 ~ 113 F)Add to Compare
5 MP resolution, Digital (DSP), Megapixel, 1.2 lux, PoE, Motion Activated, 1.37, Wide Dynamic Range, 1936 x 1936, 14 ips, White Balance, Zoom, H.264 / MJPEG, 10/100Base-T, TCP/IP, IPv4, IPv6, TCP, UDP, HTTP, FTP, DHCP, WS-Discovery, DNS, DDNS, RTP, TLS, Unicast, Multicast, NTP, SMTP, WS-Security, < 12.95 W, 730, -10 ~ +45 C (14 ~ 113 F)Add to Compare
1/3 inch, True Day / Night, 2 MP resolution, Digital (DSP), Infrared, 0 lux, 12 V DC, Motion Activated, 4.3, Wide Dynamic Range, 1920 x 1080, 30 ips, Mini or Compact, Zoom, H.264, MJPEG, PTZ, 4.44 W, 73 x 76 x 245, IP66, IK10, -20 ~ +50 C (-4 ~ +122 F), HDAdd to Compare
1/3 inch, True Day / Night, 2 MP resolution, Digital (DSP), Network, 0 lux, 12 V DC, PoE, 3.6, Wide Dynamic Range, 1920 x 1080, 30 ips, Back Light Compensation, Auto Gain Control, White Balance, 1/3(4) ~ 1/10000s, > 50, Mini or Compact, H.264/MJPEG, RJ-45 (10/100Base-T), IPv4/IPv6, HTTP, HTTPS, SSL, TCP/IP, UDP, UPnP, ICMP, IGMP, RTSP, RTP, SMTP, NTP, DHCP, DNS, PPPOE, DDNS, FTP, IP Filter, QoS, Bonjour, 6 W, 70 x 66 x 155, 620, IP66, -30 ~ +60 C (-22 ~ +140 F)Add to Compare
1/3 inch, True Day / Night, 2.1 MP resolution, Digital (DSP), Megapixel, 0.01 lux, Auto Iris, Direct Drive, C/CS mount, 24 V AC, Motion Activated, Wide Dynamic Range, 1.0 Vp-p, 75 ohm, composite, H.264 / MJPEG, Ethernet 10/100Base-T, TCP/IP, DHCP, HTTP, ICMP, UPnP, ARP, DNS, DDNS, PPPoE, SMTP, FTP, RTSP, 6 W, 56 x 68 x 115, 360, 0 ~ 50 C (32 ~ 122F), HDAdd to Compare
1/3 inch, True Day / Night, 2 MP resolution, Digital (DSP), Megapixel, 1.0 lux, 12 V DC, Motion Activated, 4.3 mm, Wide Dynamic Range, 1920 x 1080, 30 ips, Mini or Compact, H.264 / MJPEG, 10/100Base-T, 4.44 W, 74 x 76 x 245, 600, -20 ~ +45 C (-4 ~ +113 F), 85Add to Compare
1/3 inch, True Day / Night, 2.1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, Auto Iris, 24 V AC, Motion Activated, 3.3 ~ 2 mm, Wide Dynamic Range, 1920 x 1080, 30 ips, Mini or Compact, Zoom, H.264 / MJPEG, Ethernet 10/100Base-T, TCP/IP, DHCP, HTTP, ICMP, UPnP, ARP, DNS, DDNS, PPPoE, SMTP, FTP, RTSP, 10.5 W, 97 x 236, 1,900, IP66, -40 ~ +50 C (-40 ~ +122 F), MS IE 8.x or greater, HDAdd to Compare
1/3 inch, True Day / Night, 1 MP resolution, Digital (DSP), Megapixel, 0.1 lux, CS mount, 24 V AC, Motion Activated, Wide Dynamic Range, 1280 x 720, 30 ips, Inclusion DVR/ Web Server, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, Mini or Compact, H.264 / MJPEG, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 6.8 W, 600, 56 x 125 x 69, -10 ~ +40 C (14 ~ 104 F), 10 ~ 90Add to Compare
1/3 inch, True Day / Night, 3 MP resolution, Digital (DSP), Megapixel, 0.1 lux, CS mount, 24 V AC, Motion Activated, Wide Dynamic Range, 2304 x 1296, 15 ips, Inclusion DVR/ Web Server, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, Mini or Compact, Zoom, H.264 / MJPEG, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 7 W, 600, 56 x 125 x 69, IP66, -10 ~ +40 C (14 ~ 104 F), 10 ~ 90, HDAdd to Compare
1/3 inch, True Day / Night, 1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 24 V AC, Motion Activated, 9 ~ 22 mm, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 15 W, 2,300, 115 x 264, IP66, -40 ~ +50 C (-40 ~ +122 F), Internet Explorer 8.0 or above, HDAdd to Compare
1/3 inch, True Day / Night, 3 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 24 V AC, Motion Activated, 9 ~ 22 mm, Wide Dynamic Range, 2304 x 1296, 15 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, Zoom, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 15 W, 2,300, 115 x 264, IP66, -40 ~ +50 C (-40 ~ +122 F), 0 ~ 90, HDAdd to Compare
1/4 inch, 1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 5 V DC, Motion Activated, 3.6 mm, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, UPnP, SMTP, 4 W, 89 x 81 x 250, 750, -10 ~ +40 C (14 ~ 104 F), Internet Explorer 8.0 or above, 0 ~ 90, HDAdd to Compare
1/4 inch, Colour / Monochrome, 1 MP resolution, Digital (DSP), Megapixel, 0.00 lux, 5 V DC, Motion Activated, 3.6 mm, Wide Dynamic Range, 1280 x 720, 30 ips, Back Light Compensation, White Balance, 1/7.5 ~ 1/8000s, H.264 / MJPEG, RJ-45 connector, IPv4, HTTP, HTTPS, TCP, RTSP/RTCP/RTP, ICMP, UDP, IGMP, DNS, DHCP, ARP, NTP, SMTP, 4 W, 89 x 81 x 250, 750, -10 ~ +40 C (14 ~ 104 F), 0 ~ 90, HDAdd to Compare
1/3 inch, True Day / Night, 2.1 MP resolution, Digital (DSP), Infrared, 0 lux, PoE , Motion Activated, 3 ~ 9, 1920 x 1080, PAL, NTSC, 1.0 Vp-p, 75 ohm, H.264, MJPEG, Ethernet 10/100Base-T, TCP/IP, DHCP, HTTP, ICMP, UPnP, ARP, DNS, DDNS, PPPoE, SMTP, FTP, RTSP, 8.4 W, 97 x 236, 1,900, IP66, -40 ~ +50 C (-40 ~ +122 F), MS IE 8.x or greaterAdd to Compare
Browse Network / IP Cameras
IP camera products updated recently
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organizations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
Exacq has announced its integration with the highly rated monitoring station software, MASterMind. These technologies combined utilize video verification services to receive live video from the exacq Network Video Recorder when an event occurs, and sends a call to the monitoring station call center. Made possible through the Connected Partner Program, the exacqVision and MASterMind integration allows seamless collaboration of video into the dispatching process through MASvideo. This provides command centers and central stations the ability to coordinate incoming alarms with the associated video captured by cameras located at the monitored site: Features of the integration The integration provides powerful features such as: View live video linked to an incoming alarm Control single or multi image views Select between cameras utilizing PTZ camera features Record video within a single application The Connected Partner Program is designed for product manufacturers and software developers. This opportunity offers access to all the tools needed to build integrations with Tyco products, including software, hardware, documentation, sample code, dedicated engineering and marketing support.
The Security Behind Financial SecurityDownload
Nine Ways To Make Your Retail Security System Work HarderDownload
Financial Institutions Require Future-Ready Physical Security TechnologiesDownload
Dahua Technology’s Safe City Solution Chosen By The Local Government To Make Brienon-sur-Armançon Safer
- Dallmeier Electronic’s Panomera Video Security Solution Secures 14 English Premier League Clubs
- Dahua Technology Secures Astana’s BI-City Tokyo Residential Complex With Smart Residential Solution
- Dahua Technology’s Safe City Solution Chosen By The Local Government To Make Brienon-sur-Armançon Safer
- Prescott Valley’s Ocean Blue Car Wash Installs 3xLOGIC Video Surveillance System For Enhanced Security