Hotels, leisure & entertainment security applications
A comprehensive video surveillance solution consisting of 96 cameras from Dahua Technology UK is being installed at the striking Fort Dunlop commercial and retail site, overlooking the M6 motorway in Birmingham. Dahua-Champion Security’s Video Solution Built for Dunlop Rubber, Fort Dunlop became the tyre-maker’s flagship production facility and at one time was the world’s largest factory, employing 3,200 workers. After production stopped in the 1980s, the building lay derelic...
The large crowds that regularly flock to downtown Houston, Texas, known as GreenStreet, call for heightened security measures. However, the 570,000-square-foot mixed-use center needed to balance a high level of security while maintaining an open and inviting environment that accommodates numerous businesses, delivery drivers, service providers and others who need open access to the property. With an eye towards improving both security and efficiency, the property’s owners decided it...
With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programmes, events, and historical exhibitions valued at more than $2 million. Having outgrown its former location in a prominent Victorian-era mansion, the museum moved to a new downtown site in April 2011—a modern, open-concept building that has become known as one of t...
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
Avigilon Corporation, provider of security solutions, announced it was selected to enhance security at Vodafone Park stadium, in Istanbul, Turkey, of Beşiktaş JK. Enhancing Spectator And Player Safety Vodafone Park opened in April 2016 and is the venue for national Süper Lig and UEFA Champions League games. It features over 43,000 stadium seats, 144 executive suites, and more than 4,000 sq. meters (43,055 sq. ft.) of restaurants, shops and parking. To enhance spectator and player safety...
World-class service, sublime surroundings, and luxury within reach are all things you will find at Davenport Hotels in downtown Spokane, Washington. The four-hotel collection runs the gamut from classic to contemporary, full-size to boutique, and historic to modern. Guests can enjoy luxurious spa, wedding, and business facilities, as well as some of the best dining in the city. Davenport History Opened in June 2015, the new 716 room Davenport Grand Hotel offers a unique alternative for travell...
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing Humans From Animals And Statues The AI system continuously analyzes video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting People’s Privacy With AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search Versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages Of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common Use Cases Of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video Compression Technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF Physical Security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardization organizations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 Compression Formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognizes the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Somerset Mall in South Africa’s Western Cape Province has become the first shopping mall to make the transition to IP CCTV surveillance. Working with local systems-integrator, SSC Infrasek, Somerset Mall has installed 130 Hikvision network cameras to protect the safety of visitors and stores alike throughout the complex, the third-largest shopping center in the province. The scenic splendor of South Africa’s Western Cape Province has long attracted visitors. Millions of tourists flock to visit Table Mountain, the Cape of Good Hope, Robben Island – where the late Nelson Mandela was incarcerated – and enjoy the Cape Winelands and the beautiful coastline. But, as the fourth largest of South Africa’s nine provinces with a population of almost 6 million, visitors with business in mind are also plentiful in the capital, Cape Town. The town of Somerset West on the outskirts of Cape Town is ideally situated for commuters and visitors. Lying in the Helderberg basin with a view across the bay to Simon’s Town and Cape Point, and overlooked by the Hottentots-Holland mountain range, approximately 55,000 people call it home and welcome tourists to the beachfront and numerous golf courses. Both can also take advantage of Western Cape’s third largest shopping center – Somerset Mall. Bigger Challenges First opened in 1993, Somerset Mall is on the N2 Freeway that connects Cape Town to Port Elizabeth and Durban. It’s an ideal position to attract visitors and since its first opening the mall has seen numbers continue to climb. Two separate expansion phases have taken place and Somerset Mall now houses 204 stores extending over more than 1.3 km, all with single level access. Parking is also similarly extensive, with a total of 4,500 parking bays of which approximately 700 are undercover. Alongside the stores, the most recent expansion of Somerset Mall has also seen it expand to encompass an Adventure Arena. This is dominated by a spectacular double climbing wall with views of the Helderberg mountains, but the Adventure Arena also includes a 10-pin bowling alley, a games arcade and an 8-screen movie complex. As a result, the successful complex now attracts an average of 200,000 visitors per week. However, the CCTV security system had not kept pace with the growing numbers of visitors and shoppers and the Mall’s management realized that enhancing the level of security was vital. They turned to systems-integrator SSC Infrasek for a solution. New IP System The wide range of cameras and options available to us meant that we could select the right camera for the job without compromising the design objective" According to Mario Groenewald, technical manager at SSC Infrasek, “When we looked at the entirety of the security challenges facing the Mall, we quickly realised that simply supplementing the existing analog system was not going to work. The expansion of the shopping precinct to 1.3 km of storefronts together with the new Arena and extensive car parks had stretched the old system almost to its limits. Increasing levels of surveillance in the pedestrian areas and in the extensive car parks was a priority and we were also conscious that the mall is very innovative and successful in attracting visitors to its unique blend of attractions. Therefore, further expansion of the site is quite likely and any proposed CCTV system would have to be capable of coping with this expansion. “Having been tasked with implementing a comprehensive CCTV system to maintain security throughout the whole complex, we decided that the only realistic solution was to replace the whole of the existing analog system with a fully IP CCTV system, based upon 130 Hikvision network cameras supplied through their local distributor, Sensor Limited.” According to Mario, the choice of Hikvision technology was based on a number of factors. “The wide range of cameras and options available to us meant that we could select the right camera for the job without compromising the design objectives. We had also used Hikvision products in other projects and found them to be robust and reliable, delivering very high-quality images while remaining cost-effective. Finally, Hikvision has successfully delivered many similar projects around the world and offered us great support all the way from system design through to implementation.” Maximum Protection Inside For the inside of the mall, SSC Infrasek chose DS-2CD7153-E the network mini dome camera, which offers many features that make it ideal for the surveillance of an area like Somerset Mall where image quality and a robust build quality are key priorities. Inside the vandal proof IP66 rated housing, the camera is based around a large 1/3” progressive scan CMOS image sensor, offering 2 megapixel HD resolution (1600 x 1200 pixels), dual real-time video streams of up to 720p, and offers a choice of H.264, MPEG4 and MJPEG video compression. The DS-2CD7153-E model is fitted with a bright 4 mm F1.8 lens, although 2.8, 6 and 8 mm versions are also available, and offers a wide 68 degree viewing angle. The unit also offers three axis adjustments at installation and Hikvision’s ePTZ capability for increased viewing control and versatility. The result is a camera that delivers outstanding images while withstanding the rigors of a very public placement. Image quality was paramount, but protecting the camera from any environmental factors was considered closely A total of 100 DS-2CD7153-E models were installed throughout the interior of the mall.Versatility is also offered in placement of the camera courtesy of the PoE feature. Meanwhile, the inclusion of day/night automatic switching and multiple alarm triggers, including motion detection, tampering alarm, network disconnect, and IP address conflict, give installers and users maximum flexibility. SSC Infrasek opted to install 30 Hikvision DS-2DF1-518 PTZ network high speed dome cameras to protect the outside of the mall and the 3,800 outside parking spaces. Again, image quality was paramount but protecting the camera from any environmental factors was considered closely. At the heart of the DS-2DF1-518 is a powerful 36x F1.8 zoom lens that take just 5.4 seconds to go from wide open to fully zoomed. Augmented with 16x digital zoom, this bright 3.4 - 122.4 mm lens is backed up by with a 1/4’’ Sony Super HAD CCD image sensor inside a tough, weatherproof IP66 housing. This combination of 36x zoom, 3D intelligent positioning and the powerful built-in PTZ control means that operators can maintain surveillance over very large panoramas while retaining the ability to focus effortlessly on any area of interest. The camera also integrates an IR cut filter, for seamless day and night operation down to a minimum 0.2 lux in color and a very low 0.02 lux in black & white. Building Success Into The Future “The successful implementation of South Africa’s first IP surveillance solution in a shopping center environment is an impressive demonstration of SSC Infrasek’s design and implementation expertise that is set to bring in more IP projects in the coming months,” according to Mario Groenewald. “It is also an expression of Hikvision’s commitment to producing the most technologically advanced cameras and making them available to every market in the world,” he concludes.
Arecont Vision megapixel technology is proven around the world to reduce the number of cameras required while increasing video quality, coverage, and forensic recording. Hotels, casinos, theme and amusement parks, museums, restaurants, and entertainment venues of all types are customer-proven environment for Arecont Vision cameras. At the same time, customers are usually able to dramatically slash the number of cameras required for a less-prevalent and more welcoming surveillance environment while delivering superior situational awareness with Arecont Vision SurroundVideo multi-sensor panoramic and omnidirectional camera models. Video Surveillance Applications Video surveillance is growing in use not only for the traditional protection of guests, facilities, staff, and visitors, but also for people counting, access control/identify management, traffic and parking management, forensic recording, and real time monitoring. Typical Deployments Criminal behavior and vandalism deterrence Facial recognition and identification Traffic monitoring and vehicle identification Parking monitoring and license plate recognition Crowd and traffic flow monitoring Monitoring of restaurants, bars, retail areas, lobbies, reception areas, lounges, gaming areas, event spaces, parking lots, corridors, elevator lobbies, gyms/health clubs, pools, offices, stock rooms, and storage areas Litigation protection indoors and outside Vehicle monitoring for pre-existing damage for parking areas and valet Overall situational awareness What Arecont Vision's Customers Say “These cameras help reduce our on-floor manpower and increase our effectiveness because there can be one person on the floor and another person who is watching the camera, who can cover 10 times more area than one person can on foot. "We certainly didn’t want to give people the feeling that they are being watches throughout the hotel. We really like how the low profile of the cameras and the multi-sensor capabilities enabled us to use just one camera opposed to four separate ones," comments Kevin Miller, Corporate Director of Security for the Davenport Collection of Properties “We demonstrated the superior performance of Arecont Vision’s megapixel cameras to provide wide area coverage in almost any lighting. Mr. Linh’s staff at the Sheraton Saigon Hotel & Towers were so impressed that we designed and built a new video surveillance solution around Arecont Vision’s imaging technology," states Thomas Tran, Citek Corporation.
One of Italy’s grandest hotels has upgraded to a state-of-the-art March Networks video surveillance system. Château Monfort, a five-star hotel located in the center of Milan, is part of Italy’s luxury Planetaria Hotels chain. Planetaria Group operates four and five-star hotels in some of the country’s most popular destinations. Video Surveillance For Events Improving the performance and efficiency of video surveillance at Château Monfort was the primary reason the Planetaria Group turned to March Networks. “Our video surveillance solution had to provide maximum safety for our guests, and deter any illegal activity,” said Hotel Manager Stefano Risolé. “We were particularly concerned about security for some of the large events we host, where visitor numbers increase and the risk of theft is much higher. “The reception desk is always open and our staff are always present and available, but we wanted the added assurance of a real-time monitoring and security system,” noted Risolé. 24/7 Monitoring Of Premises Château Monfort wanted to upgrade its older video surveillance system with a solution that enabled comprehensive monitoring of its premises 24/7. It was also important to have access to technical support in order to promptly resolve any performance issues. The Planetaria Group knew it could count on March Networks, having already deployed the company’s video technology at the Hotel Pulitzer, its five-star property in Rome. March Networks was able to demonstrate how its intelligent video solution could meet the hotel’s strategic challenges A world leader in the business-to-business (B2B) security sector, with many years of experience in banking, retail and hospitality, March Networks was able to demonstrate how its intelligent video solution could meet the hotel’s strategic challenges. After evaluating various options, Château Monfort selected the March Networks Command Enterprise video management solution with server-based recording. “It is essential for a prestigious hotel like ours to have the highest-quality video security system that is proven to be both reliable and easy to use,” said Risolé. “Our choice was influenced by the need to protect the hotel’s reputation. We needed a system that would be fool-proof. Human error can lead to mistakes, and we want to guard against this at all costs.” System Scalability The March Networks system allows Château Monfort to investigate reported incidents of missing or damaged property while making sure that privacy is always respected. Authorized staff have access to live and recorded video as required, and can monitor the hotel remotely from any networked location. Equally important, the system is scalable, ensuring that Château Monfort will be able to take advantage of technology advances in the future. “March Networks has expertise in the design and supply of products and solutions to meet the most demanding security requirements,” said Paolo Romanò, March Networks Regional Sales Manager for Southern Europe. “Our focus on innovation and the development of cutting-edge products supported by great service has proven to be a winning formula and has been fundamental to our growth and customer satisfaction.” Video Surveillance Solution Features Installed by March Networks certified partner Hitech Madness in July 2015, Château Monfort’s video surveillance solution includes 40 March Networks IP cameras, with models such as the MegaPX WDR MiniDome Z, and three Edge 4e Encoders to digitise video captured from existing analog cameras. It also includes a Dell server pre-configured with Command Recording Server software and internal RAID5 storage to ensure redundant data protection, even in the event of hard disk failure. The solution is set to automatically overwrite recorded video after two days to comply with Italian privacy legislation. Three years after the hotel opening, and with various upgrades since, the technical support provided by March Networks remains flawless Security staff and the hotel’s director can access live and recorded video captured by surveillance cameras installed on every floor of the hotel via March Networks Command client software. Château Monfort uses the Command client to display the various interface screens for configuration and video review. The software is very intuitive, with menus organized in a logical way to help less technical users configure the system in a few steps. User privileges and more complex camera and alarm configurations are also easy to set up using rules and conditions. System users are able to quickly search for recorded video by scanning thumbnail images and export video evidence together with explanatory notes for follow-up by law enforcement. Constant Monitoring For Crime Prevention “Château Monfort has used March Networks products from the beginning, following specifications drawn up by the main contractor,” said Gioele Colombi of Hitech Madness. “I have been very satisfied with the quality of the solutions and the excellent price performance ratio.” “Three years after the hotel opening, and with various upgrades since, the technical support provided by March Networks remains flawless. Technical and marketing support are always available and very professional. In the security sector, issues can occur, but with the approach taken by March Networks, resolutions are easy to find.” Hotel manager Stefano Risolé said the video evidence captured by the system has proven extremely useful on more than one occasion. “Using our March Networks video, we were recently able to identify the cause of damage to a valuable, ornamental statue located in one of our public areas. More than that, the police have used the recorded video to investigate a theft that occurred in front of the hotel entrance.” Thanks to March Networks and Hitech Madness, Hotel Château Monfort is able to rely on a stable, scalable and high-quality video solution that provides comprehensive surveillance throughout the property. The image quality and ability to access the system remotely allow staff to constantly monitor the premises and guard against critical situations.
Customer Located in the Meadowlands and part of the MetLife Sports Complex in East Rutherford, New Jersey, MetLife Stadium is home to the New York Football Giants and the New York Jets. The $1.6 billion stadium was financed and built by a joint venture between the two teams, who operate it through the New Meadowlands Stadium Company. The stadium opened in April 2010 and boasts a seating capacity of 82,500, making it one of the NFL's largest stadiums. On February 2, 2014, MetLife Stadium played host to Super Bowl® XLVIII. Challenge MetLife Stadium wanted to replace 26 IP cameras located at the perimeter gates of the stadium and also to deploy 180° panoramic-view cameras in place of the 27 pan-tilt-zoom (PTZ) cameras that covered the exterior perimeter. Given the large crowds they attract, each football game, concert or other event has its share of unique challenges, including monitoring fan conduct, crowd management situations and dealing with medical emergencies. MetLife Stadium's main goal in upgrading its surveillance system was to ensure a safe, secure environment that would contribute to a memorable guest experience. Incident prevention and monitoring were additional key goals of the project. MetLife Stadium staff members are challenged with trying to determine what happened after an incident occurred. There are often various versions and accounts from those involved and from independent witnesses. Clear recorded video is needed to reveal what actually happened. Prior to the new camera system being installed, MetLife Stadium used four PTZ cameras to monitor the seating bowl area and these cameras were only used reactively when an incident came to the attention of the stadium's Command Center. With the new camera system, every seat in the seating bowl is monitored at all times. Being able to have their Command Center personnel go back in time and review everyone’s actions is an extremely valuable investigative tool for stadium security personnel and for public safety agencies. Among the stadium security management team's other goals are to identify and examine objects left behind, monitor security screening procedures, investigate slip-and-fall incidents, observe staff performance and provide surveillance for counter terrorism efforts. Solution Because MetLife Stadium was designed to be a network-controlled building, IP cameras were part of the original design. When it came time to install cameras to cover the seating bowl, IP was the only platform considered, according to Daniel DeLorenzi, Director of Security for MetLife Stadium. "To run an analog system would have been cost-prohibitive due to cabling, and the cables would be single-purpose. If upgrades were necessary, the project would have to be completed all over again," DeLorenzi said. The excellent image quality provided by the Arecont Vision megapixel cameras makes it possible for stadium security to identify individuals DeLorenzi and the rest of MetLife Stadium's security management team turned to Robert McCabe, owner of Corporate Security Services, Inc., located in Edison, N.J., to assist in selecting IP surveillance components and to design and implement the video surveillance solution. After a careful evaluation process, an optimal surveillance solution was built around megapixel imaging technology from Arecont Vision to ensure wide area coverage with extreme detail and to enable forensic zooming on live and recorded video. Corporate Security Services deployed more than 130 Arecont Vision megapixel cameras throughout MetLife Stadium, including MegaVideo® Compact 10-megapixel (MP) cameras located around the bowl of the stadium to provide a view of every seat in every section; SurroundVideo® panoramic 8MP cameras provide 180° coverage of entrances and common areas; and MegaDome® 2 3MP cameras with remote focus and wide dynamic range (WDR) are located in the stadium’s security entrance areas. Arecont Vision WDR cameras provide detailed video where bright and dark images exist in the same scene. The Arecont Vision megapixel cameras are controlled using Genetec Security Center, a unified video management system (VMS) which is monitored by a centralized security command center within the stadium. Arecont Vision worked with Corporate Security Services' designers to provide a layout of the camera locations required to cover the area, which McCabe says helped with the installation. In the end, all the cameras were installed in easily accessible and serviceable locations. Megapixel Benefit Because of the high level of detail it provides, one Arecont Vision SurroundVideo panoramic camera covers the same area as multiple IP VGA resolution cameras. By using Arecont Vision cameras to reduce overall camera counts, MetLife Stadium’s security team was able to achieve its goal of implementing an unobtrusive high-performance video surveillance system. With a reduction in the total number of cameras implemented, the system can be more efficiently managed. MetLife Stadium's policy is to initiate real-time recording 24-hours prior to game day, at which time every camera within the stadium is recorded at its full frame rate. Incidents are recorded prior to, during and for several hours after a game or other event. This allows the security staff to easily search and play back detailed video of any reported incidents from any of the cameras to determine what happened. Because of the high level of detail it provides, one Arecont Vision SurroundVideo panoramic camera covers the same area as multiple IP VGA resolution cameras The excellent image quality provided by the Arecont Vision megapixel cameras makes it possible for stadium security to identify individuals, and the high frame rates allow them to see actions that occur. Additional benefits of the Arecont Vision cameras include Day/Night video capabilities where mechanical infrared (IR) cut filters are used for clear images in low light, H.264 compression to reduce network and storage costs and Power over Ethernet (PoE) to reduce cabling costs. Arecont Vision MegaVideo Compact series box cameras are available in 1.3MP to 10MP resolutions with features that include dual H.264/MJPEG encoding, fast frame rates, privacy masking, pixel binning to increase light sensitivity in 3MP, 5MP and 10MP models, extended motion detection grid, flexible cropping and PoE. They are available in color and Day/Night configurations. SurroundVideo series megapixel cameras from Arecont Vision are all-in-one 180° and 360° panoramic solutions that are available in 8MP, 12MP WDR, 20MP and 40MP resolutions. Housed in environmental rated IP66 domes, the units feature dual H.264/MJPEG encoding, true Day/Night functionality, IR corrected megapixel lenses, privacy masking, extended motion detection, bit rate control, binning mode to increase light sensitivity in 12MP, 20MP and 40MP models, fast image rates and WDR in 12MP models. Arecont Vision MegaDome 2 all-in-one cameras with remote focus and remote zoom are available in 1080p, 3MP, 5MP and 10MP resolutions. Features include an IP66-rated / IK-10 impact-resistant dome chassis with a 3-axis camera gimbal for easy adjustment, dual H.264/MJPEG encoding, integrated megapixel vari-focal lens, optional WDR in 1080p and 3MP models, pixel binning in 3MP, 5MP and 10MP models, total PoE and optional IR illumination, audio functionality and heater kit.
The Need For Improved Access Control Since the Cruise Vessel Security and Safety Act (CVSSA) of 2010, also known as the Kerry bill, was signed, on-board safety and security has been improved on cruise ships headed to or from American ports. Under the numerous specifications of the act were significant improvement requirements to crew member access and control procedures. The new requirements meant cruise lines needed to move fast to make upgrades, especially the lines with high demand and around-the-clock travel schedules. This would require a reliable system, along with a smooth implementation process in order to keep goals on track and ships on schedule. For one of the world's leading luxury liners, the act meant that they would have to establish a new key control system for its four ships. With thousands of weekly passengers and destinations in Europe, Panama, the Caribbean, Alaska, and other transatlantic locations, an updated key management system was an instant priority. The cruise line's previous key system not only lacked individual and time-based access control, but it also required long periods of key collection and distribution. Automated Key Control With Access Restrictions "With the new requirements of the CVSSA of 2010, we needed the tools to meet the new key control guidelines. This meant that controlling access to different keys by person and time-frame was necessary, as well as a system to go along with it." Traka fulfilled this goal by providing intelligent, software-driven key cabinets with automated key issuing to ensure the cruise line exceeded the CVSSA requirements, along with a complimentary system that could be maintained by the existing security staff. For a smooth implementation process, the cruise line required a solution that could be integrated with their existing manual systems. Traka's key cabinets were a clear solution for the four vessels, as they could be quickly integrated with existing systems and exceed the access requirements of the Kerry Bill with their products. The Roll Out The implementation of Traka technology made this the first cruise line in the world to adopt the latest in key management in accordance with the CVSSA of 2010. With no complete key management systems in place and only manual processes, critical Traka electronic key cabinets were installed. Meeting the CVSAA requirements calls for a thorough planning process to go alongside the installation and training, but Traka went above and beyond what was expected with unique, specific processes designed for each ship. In a one to two week period, Traka carefully planned out how keys would be managed for the cruise line, who would have access to them, along with pinpointing when, why and how auditing the system would occur. An existing Traka security officer with the cruise line is able to manage the Traka systems with little impact on current workload, following a quick turnaround, implementation with the current specs, as well as training. With Traka, the increase inaccountability and productivityallowed for average monthlysavings close to $2500, completelycovering the return on investmentin just six months along with aquick, continuous profit Accountability And Increased Productivity "The main benefits of using Traka have been the key accountability and increased productivity, which eliminated approximately 120 personal hours per month that had previously been spent collecting and distributing keys." Though the Kerry Bill required access changes, the cruise line got much more in return by using the best in key management technology. With Traka, the increase in accountability and productivity allowed for average monthly savings close to $2500, completely covering the return on investment in just six months along with a quick, continuous profit. Once the new Traka systems were implemented, crew members saw major productivity increases. Now that keys don't have to be issued at the beginning and end of shifts, crew members appreciate the time saved. As a whole, the cruise line immediately recognized an extended list of benefits from implementing Traka, including: Key accountability Increased productivity Lower collection & distribution time Reduced costs Quick, effective implementation process Access control by person & time Return on investment in under six months After being the first cruise line to adopt key management, they plan on continuing to stay ahead of the pack with compliance and security for their passengers. Moving forward, they plan to purchase 10 more Traka key management systems and standardize based on Traka's complete fleet of key and asset management systems, including expansion with storage lockers to help protect electronic equipment and ignition control systems for vehicles. They also look forward to continued cost saving with Traka systems, along with training the shore side crew, so that they are up-to-speed with the on-board crew members and their grasp of the full range of key management solutions.
Customer Nirvana Spa is located about an hour outside of London in the Berkshire countryside. The award-winning facilities feature a variety of amenities including treatment rooms for hands-on healing, a gym, cafes, and 14 natural mineral water pools designed for pleasure, relaxation, or therapy. Nirvana Spa has a well-deserved reputation for luxury and first class service that has attracted a diverse range of clientele seeking to relax and unwind in secure and pampered comfort. Challenge Video surveillance cameras are as much a part of daily life in the UK (United Kingdom) as are the local pubs, and the grounds and facilities of Nirvana Spa are no exception. Video cameras on pan/tilt units have been installed outdoors on poles, on rooftops, and on the sides of buildings to cover the parking lot, perimeter areas, entrances, tennis courts, outdoor gardens, and maintenance buildings. Fixed and pan/tilt cameras have been installed in exercise rooms and pool areas for safety reasons and for general security in common areas. In keeping with the premium standards set at Nirvana Spa, the original analog video surveillance system was high quality when originally installed. Image quality was considered acceptable but required additional lighting to ensure useable recordings on a 24/7 basis. The need to increase the number of cameras for additional coverage was a major concern since it would become more difficult for the surveillance system to remain discrete. The most important issue related to the existing pan/tilt cameras, which were not adequately capturing incidents on video because they were usually facing the wrong direction when an event occurred. All of these issues were of concern and needed to be addressed by the new solution. Megapixel Solution Nirvana Spa management received a demonstration of Arecont Vision® SurroundVideo® panoramic megapixel cameras arranged through its system integrator, Lantec Security. The image quality of the Arecont Vision® SurroundVideo® panoramic cameras was considered to be far superior to other cameras that were demonstrated and evaluated. Camera features include true wide dynamic range (WDR), motion detection, day/night functionality, remote focus/remote zoom, and vandal-resistant housings. Arecont Vision® SurroundVideo® 180° and 360° panoramic megapixel cameras were the choice for the new installation. Megapixel Benefit Arecont Vision® SurroundVideo® IP AV-8185DN panoramic megapixel cameras were deployed for surveillance of the car park and surrounding perimeter areas. Each camera provides a 180°continuous view of the scene which means that fewer cameras are needed to cover the entire area. There are no lapses in coverage, unlike the previous pan/tilt-based solution. The day/night capability of the SurroundVideo® cameras also ensures that high quality video is captured 24 hours a day. In the event of an incident, operators can zoom in live or on recorded video for a closer look or for evidentiary purposes. The surveillance system provides full coverage of external parking areas and increases safety of customers & staff Arecont Vision® SurroundVideo® IP AV-8365DN panoramic megapixel dome cameras are used inside the facilities. Each camera provides a continuous 360° view. Areas which previously required several analog pan/tilt cameras are now monitored by a single 360° megapixel panoramic camera. Nirvana Spa clients and staff alike appreciate the added coverage without the feeling of being watched. Issues are now quickly resolved because of the exceptional video quality and the ability to capture the moments leading up to and after any incident. “The image quality of the Arecont Vision® megapixel cameras is excellent,” said Graham Walker, Head of Procurement & Security, Nirvana Spa. “They have helped us to improve the level of safety and security without intruding on anyone’s sense of privacy.” Significant cost benefits were delivered by requiring fewer cameras and less supporting infrastructure. The SurroundVideo® panoramic megapixel camera solution is also less taxing on the IP network due to H.264 compression and bit rate control capabilities. Digital Sentry Video Management Software Digital Sentry® video management software from Pelco by Schneider Electric was selected as part of the project. Digital Sentry® is Arecont Vision® MegaLab™ integration certified. These collective advantages further reduce the overall Total Cost of Ownership (TCO) of the new surveillance system while increasing Return on Investment (ROI) for Nirvana Spa. “From a cost standpoint, we have saved time and money,” said Mr. Walker. “Fewer cameras are needed and any problems or incidents are resolved much faster and with less expense.” Megapixel Video-Based Solution The megapixel video-based solution delivers highly detailed images that are displayed on a video wall and monitored 24/7. Operators are able to control which views from each of the Arecont Vision® cameras are displayed, and they can zoom in on any selected areas to get a closer look if needed. The high quality of the video and the combined camera and VMS functionality allows Nirvana Spa to monitor key areas such as the gym and to respond to incidents or issues in real time as they occur. The new surveillance system also provides full coverage and recordings of external parking areas, minimizing potential losses, and increasing the safety of both customers and staff in a discreet manner.