Industrial & commercial security applications
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an ex...
The large crowds that regularly flock to downtown Houston, Texas, known as GreenStreet, call for heightened security measures. However, the 570,000-square-foot mixed-use center needed to balance a high level of security while maintaining an open and inviting environment that accommodates numerous businesses, delivery drivers, service providers and others who need open access to the property. With an eye towards improving both security and efficiency, the property’s owners decided it...
BASF is one of the world’s leading chemical companies. Its portfolio ranges from chemicals, plastics, performance products and crop protection products to oil and gas. The company has been a committed partner to Greater China since 1885 and currently is one of the largest foreign investors in the Chinese chemical industry with major investments in Nanjing, Shanghai and Chongqing. Need For Protection According to BASF’s Greater China Report published in 2012, local production enabl...
The average German consumer generates nearly 213 kilos of packaging waste every year. ZAK–Zentrale Abfallwirtschaft Kaiserslautern—the municipal waste management company of Kaiserslautern, treats, recycles and disposes of this and other types of waste for the more than 250,000 residents of the city and district of Kaiserslautern, Germany. ZAK relies on MOBOTIX video systems to ensure that operations run smoothly and that the 88-hectare premises of the modern waste ma...
The Enforcer 32WE APP is a professional high-security wireless solution, that delivers maximum security, flexibility, potential and opportunities for installers and users alike. Profitable Business Solution With remote programming and diagnosis of the system using InSite UDL software via the PyronixCloud, the Enforcer 32WE APP system can be checked and even amended without having to send an engineer to site. This means there are fewer call-outs for the installer, or, should an engineer still...
Security and surveillance systems are becoming critical to manufacturing plants and factories by helping to address the theft of raw materials, the theft of IP, and the tampering of equipment, machinery and cargo. They can also serve as an effective monitoring tool for overseeing assembly line production and worker safety. A Micron/Repon Case Study Repon, a manufacturer of high-quality ball bearing slides used in various industries including server- and rack-mount systems, office/home furnitur...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs And Trade Concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalized concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement Of Surveillance In Chinese Human Rights Violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased Global Media Attention The ban has not been widely publicized in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader Interpretation Of The Bill Beyond The Federal Government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, VA., has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernized halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European Physical Security Market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organizers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimized hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly Modernized Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting program. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The program opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will center on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive Program A Security Expert Forum in Hall 2 will present a continuous program with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the program will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
Since 2008, Transportation Impact, a privately held 5-time Inc. 5000 company, has been providing maximum supply chain cost reduction for clients in multiple vertical markets. The company, which is based in Emerald Isle, North Carolina, has made a huge impact on the bottom line for clients by reducing shipping costs through small package and freight negotiation along with their state-of-the-art transportation management system.Today, the company employs a team of 70 to employees and contractors, with more than 300 years of combined carrier experience, leveraging its industry savvy to drive down clients’ net annual freight spend by an average of more than 20 percent. By staying true to its core values of work ethic, professionalism, perfection, integrity and passion, Transportation Impact has developed a strong presence in its community, is among the fastest-growing businesses in the country and has been named among the Best Workplaces 2017. With two ultra-modern office buildings based in North Carolina, the safety and security of the company’s dedicated employees and infrastructure became a major priority for Transportation Impact. It was time for the company to invest in an industry leading access control system to protect their valued employees now and down the road. Securing Conference Room And Executive Areas Transportation Impact is dedicated to making a significant impact on its clients’ bottom line and this dedication proliferates into their internal operations. With 70 employees working out of two office buildings in Emerald Isle, NC; they needed an access control solution to safeguard employees and their infrastructure.The company’s corporate headquarters reside in a building that consists of 4 floors with two floors containing executive offices and conference rooms and the top two floors housing a restaurant and bar which is open to the public. The biggest challenge Transportation Impact found with a shared building is the common occurrence for the public to walk in on private meetings taking place in the conference rooms and inquire about the location of the restaurant. Having the public enter Transportation Impact’s office at will was not only a disruption, but a security risk for employees and private company information and systems. It was imperative that the conference room and executive areas were safeguarded from unauthorized access. Having the public enter Transportation Impact’s office at will was not only a disruption, but a security risk for employees ISONAS Pure IP™ Access Control Solution With its rampant growth, it was time for the company to increase the level of security at their facility and invest in an access control solution that was simple to administer across multiple buildings, could handle the addition of geographically dispersed locations and provide their users with a convenient method to access the buildings. Transportation Impact needed a special delivery, the right access control solution from their trusted security integrator, Electronic Solutions. Electronic Solutions has been working with Transportation Impact over the last few years and understood their need for a simple and convenient access control solution. Ron Snyder, President at Electronic Solutions and an ISONAS certified partner, delivered the ISONAS Pure IP™ access control solution in the fall of 2016 starting with a pilot program for ISONAS’s new RC-04 reader-controller all managed from the ISONAS software, Pure Access cloud.Transportation Impact was one of the first companies to use the new hardware product and provide feedback on the functionality and usability of the system. In addition, they were one of the first to take advantage of the Pure Mobile credentials from ISONAS. “ISONAS is a great team to work with as they are all about supporting their certified dealers and offering top notch customer service to help make the implementation process seamless,” states Ron Snyder, President at Electronic Solutions. “The ISONAS solution is a great product and so much easier than the past access control systems that required running several cables to install it. ISONAS offers a simple solution, which only requires an ISONAS reader-controller and a CAT 5 cable for power and data; making it an easy deployment for customers.” Together, ISONAS and Electronic Solutions made a huge impact and created a safer workplace environment for Transportation Impact with convenient security at a minimal cost. Convenient Mobile Access Control One key challenge that drove Transportation Impact and Electronic Solutions of Greenville to choose ISONAS was the need for convenient access for their users. Upon the initial installation, Transportation Impact utilised key fobs to provide access to their users. Unfortunately, a number of the key fobs were lost which resulted in employees propping open doors; circumventing the security and effectiveness of the access control solution. With the number of lost key fobs, Transportation Impact needed to find a way to incorporate access control into their employees’ normal, everyday practices. The ISONAS Pure Mobile credential allowed them to take the convenience of their mobile phone to the next level. The Bluetooth® Low Energy feature of the Pure IP™ hardware family (RC-04) eliminated the need for a physical card or key fob and allowed a mobile device to act as an access card. With the simplicity of Pure Mobile in combination with Pure Access, there was no need to install additional software, purchase additional licenses to enroll mobile credentials, or acquire a massive bank of credentials. The RC-04 hardware and Pure Access software are ready to use with the ISONAS Pure Mobile credentials right out of the box. An employee at Transportation Impact can simply download the Pure Mobile application to their phone, present it to a reader-controller, and the facility administrator associates that mobile phone to the user’s profile. “In addition to having mobile access, we really liked having the ability to automate on a schedule and set the doors to lock and unlock during certain times of the day" “We were looking for an easy-to-use access control solution that allowed access with the touch of a button and we found it,” says Norm Pollock, VP of Information Technology at Transportation Impact. “In addition to having mobile access, we really liked having the ability to automate on a schedule and set the doors to lock and unlock during certain times of the day all from the Pure Access Cloud software.” With this new technological advancement delivered to their door, Transportation Impact had the right solution in place to avoid the days of lost key fobs. By having employees use their smart phones as a credential to enter the building, the company could rest easy knowing that they were protected and in a secure operation. Pure Access Cloud Software With a successful pilot program under their belt, Transportation Impact currently has 11 ISONAS RC-04 reader controllers installed across two office buildings all administered from the Pure Access Cloud software, giving them access from anywhere at any time. Pure Access cloud eliminated the need for any additional onsite network infrastructure and provided full administrative and management power of their access control system from any device. Now they can assign users to the system, establish access schedules, events and holidays preventing doors from being propped open and surprise visits from the public. With 9 doors secured in their corporate headquarters and two installed in their second building on the front and back doors; Transportation Impact is ready for business. ISONAS, Electronic Solutions of Greenville, and Transportation Impact all took the high road and worked together to implement a new access control system that helped to improve safety while being convenient at the corporate headquarters. With plans of a third office building in the works, it will be an easy road for Transportation Impact to add additional doors to their powerful access control system; now and in the future.
The Dahl Auto Plaza in Winona, Minnesota is part of an auto dynasty that first began in 1911, when Andrew H. Dahl began selling Ford Model T’s out of his general store in Westby, Wisconsin. The company is in its fifth generation of Dahl family ownership with over a century of growth behind it. Today Dahl operates three dealership campuses throughout the Midwestern United States that are home to Subaru, Hyundai, Mazda, Toyota, Chevrolet, Buick, GMC, Ford, and Lincoln automobile franchises. During construction of the new Dahl Auto Plaza in Winona, the installation of a video surveillance system was a required part of the planning. Arecont Vision became the go-to manufacturer for all the dealership’s surveillance cameras. Video Surveillance System Challenge Winona’s Dahl is home to three different dealerships on a single campus — Chevy, Toyota, and the Dahl Used Car Express Service Center. The company needed a comprehensive video surveillance system to monitor its parking lots and service bays for traffic, customer flow, vehicle flow, vandalism, and theft. With a desired 15-16 camera limit to cover such a large amount of space, cameras with high image quality and flexibility were essential to the new surveillance system’s success. No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series Arecont Vision Try-and-Buy Program The implementation of Arecont Vision megapixel cameras at Dahl Winona began with the use of Arecont Vision’s Try-and-Buy program at the recommendation of Russ Neitzke, President and Founder of systems integrator Digicom, Inc. Cameras selected for a Try-and-Buy trial can be returned by the systems integrator for a full refund of the purchase price if the customer is unsatisfied. The only cameras considered for the Dahl video surveillance system were Arecont Vision SurroundVideo Omni models after they were tested. “No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series,” Mr. Neitzke said. “As a result, no other surveillance camera manufacturers were recommended by Digicom, Inc. or would be able to so effectively cover the 15 acres of new and used vehicle display, public access, and vehicle service areas at the new Dahl Auto Plaza.” SurroundVideo Omni Unique Design The SurroundVideo Omni series features a unique, patented 360o track design. Each camera includes four individual megapixel (MP) sensors mounted in multi-axis gimbals that can be independently placed and aimed in nearly any configuration, allowing coverage to be highly customized to specific project requirements. With features like remote focus in the SurroundVideo Omni G2, interchangeable lenses and high-resolution capabilities (12 and 20MP) in both G1 and G2 series models, the versatility of this camera family is unmatched. For large open spaces such as those found at the new Dahl campus, the SurroundVideo Omni series provides high resolution, omni-directional video in a rugged, low profile enclosure suitable for both indoor and outdoor use. The cameras are IK-10 impact resistant and IP66 environmental rated against dust and water, making them ideal for Dahl’s requirements. Reduced Need For Multiple Cameras Most critical for Dahl were the SurroundVideo Omni series benefits of low maintenance, high video resolution, and the ability to reduce the number of cameras required for full situational awareness throughout the campus. The SurroundVideo Omni 12MP models selected include Wide Dynamic Range (WDR) technology, which aids in producing high quality, clear images even in challenging light situations. The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money With Digicom Inc. designing the surveillance and installation plans, Dahl was in good hands. Dahl selected the SurroundVideo Omni series, reaping the significant benefit of reduced installation time. Each sensor gimbal in a SurroundVideo Omni is magnetically set in place around the 70+ placement-point omnidirectional track and then quickly locked down during installation.The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money on both camera cost and installation requirements. Without the need for the constantly moving parts of a legacy Pan-Tilt-Zoom (PTZ) camera, there are no parts, gears, belts, or motors to wear out and to require maintenance in the SurroundVideo Omni series. This reduces ongoing operational costs. This makes it easy for the installer to arrange an ideal coverage layout. Another significant selling point for Dahl was that each SurroundVideo Omni camera requires only a single IP category 5 PoE (Power over Ethernet) cable, which reduces both complexity and installation cost. ExacqVision VMS Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets. Arecont Vision Technology Partner Program member ExacqVision is utilised for the video management system (VMS). A single ExacqVision VMS license is required for each SurroundVideo Omni camera, while providing four high-definition video views. Arecont Vision cameras are certified with ExacqVision and the VMS is installed in the Arecont Vision MegaLab™ to enable ongoing collaboration between the two companies and to ensure the best possible integration and support for customers. Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets Arecont Success At Dahl The Arecont Vision SurroundVideo Omni cameras at Dahl have been a great success, with high customer satisfaction. “Basically,” Mr. Neitzke stated, “The coverage that you get with the SurroundVideo Omni is really like buying four cameras in one.” Being able to effectively cover Dahl’s range of campus requirements with fewer cameras and lower purchase, installation, and operational costs meant that Arecont Vision has hit all the required marks for this project, according to Mr. Neitzke. The system has performed incredibly well, with few issues from the end-user. On the rare occasion when an issue has popped up, the Arecont Vision team has been responsive to the customer’s needs, providing technical support, advanced replacements, or any other kind of assistance Dahl has needed for the surveillance system. Future Projects Arecont Vision and Dahl are now planning a second, even larger project at Dahl’s campus in downtown La Crosse, Wisconsin. Dahl plans on upgrading this campus with a new surveillance system for indoor and outdoor spaces with Arecont Vision cameras. Digicom, Inc. and the Arecont Vision Field Application Engineering groups are developing a campus-wide plan for this next project. SurroundVideo Omni will be ready to be deployed yet again whenever Dahl needs it.
AThe IVX, Inc. is a revolutionary technology startup founded by industry veterans from Cisco, Jupiter and Motorola. The company is dedicated to providing innovative, high performance, fully integrated solutions for the public safety sector that effectively manage collaboration among multiple agencies and improve crisis management response time. The IVX enables real-time surveillance data collection, synchronization and collaboration across the private and public safety sectors. Public Safety Challenge In the wake of recent mass shootings and terror attacks on high profile cities, public safety is once again at the top of the agenda. The growing number of higher specification surveillance cameras and the huge amount of data they generate, combined with longer data retention periods and real-time response requirements, are pushing the boundaries of what traditional storage approaches can handle. With these market conditions building, The IVX set off to look for an alternative solution for video surveillance. From proprietary to open source to private and public cloud solutions, The IVX tried different approaches, but they failed to deliver the necessary performance and cost efficiency. Both NetApp and EMC solutions required expensive software licenses and would incur hardware and maintenance costs, while open source software lacked reliability, software manageability and support. Additionally, encryption and data security concerns are still inhibiting the widespread use of the public cloud for surveillance solutions. Promise Solution At The IVX After testing and conducting proof of concept, The IVX concluded that Promise Technology’s purpose-built hyperconverged infrastructure – VskyCube – was the only solution to meet all of their current needs while providing a path for the future. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks VSkyCube pre-integrates computing, storage, and networking into hyperconverged nodes, giving a pre-integrated and adaptable cluster with a unified pool of resources that can be deployed, adapted, scaled, and managed quickly and easily. It is specifically optimized for video surveillance workloads and brings the benefits of the hyper-scale datacenter to the market. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks. They also have the ability to manage, monitor, scale and adjust compute, storage and networking resources all in the same web interface with the centralized management software, VSkyView. As the number of cameras and the amount of video they capture continue to increase, the IVX can dynamically scale out to multiple PB for 24x7x365 intensive workloads without interruption, thanks to Promise’s software-defined cloud storage – VskyStor. And, most importantly, all sensitive data is protected by RAID and RAIN. High resilience and high availability features prevent drive and server failure, making for uninterrupted video capture and access. Promise Solution Business Benefits With 24/7 support from Promise Technology, The IVX has successfully delivered surveillance services through a virtual private cloud on top of VSkyCube. The IVX can now handle 250 TB of HD surveillance video data, and is enjoying a 20-40% reduction in budget that was previously going to things such as hardware and software licensing and operating costs.VSkyCube is the only enterprise-class surveillance infrastructure that delivers the highest levels of performance, resiliency and data protection, all without the cost, complexity and skills typically required by virtualized environments. Anson Chen, Vice Chairman and Co Founder of The IVX Inc. said: “VSkyCube is an advanced hyperconverged system with all of the enterprise storage features we need. It is a perfect fit for solution providers like us who need a reliable solution that can grow over time, and allow us to maximize budgets. Promise Technology delivered on everything they promised! The close collaboration and timely support from Promise’s global teams help us provide excellent service to our customers.”
Logistics Services Vos Logistics, founded in 1944, is an independent European logistics service provider, delivering a wide range of transport and customer specific logistics services. With 24 locations, Vos Logistics is active throughout Europe and ranks among the largest road haulers in the region. With just under 1,900 employees, the company operates a modern fleet of 1,200 vehicles, 3,000 loading units and 170,000 m² of storage space. The strength of the company lies in its combination of innovative skills in transport and logistics, a highly developed European network, advanced transport management systems and a sharp focus on quality and service. These qualities are reflected in the high degree of customer satisfaction, particularly with prompt delivery times, low loss rates and value for money. Upgrading Warehouse Video Surveillance Vos Logistics is committed to going the extra mile by providing a safe environment for its warehouses and ensuring their customers receive excellent and professional service. In order to deliver on the core company values, Vos Logistics decided to upgrade their video surveillance solution at their warehouses to protect the millions of dollars of assets that it stores every day. Vos Logistics faced stricter security requirements and therefore wanted an IP video surveillance solution to leverage the latest innovations in security systems. Vos Logistics placed a premium on deploying a solution that streamlines configuration and management, is easy to use, and delivers consistent throughput and reliable data protection. Promise Technology's Vess A2000 Series NVR Appliances, Milestone XProtect® Video Management Software (VMS) and cameras from Axis Communications proved to be the answer for Vos Logistics as the solution offered unmatched quality, interoperability and performance for video surveillance of the company’s warehouse. The PROMISE Solution PROMISE Vess A2000 NVR storage appliances and Vess R2000 external storage solutions are specifically designed for the challenges customers face in surveillance environments and can scale to meet long-term data retention requirements. Vos Logistics deployed Vess A2210 NVR storage appliances with the video recorded from all of the Axis cameras at the warehouses to a large-scale centralized storage infrastructure. Vess A2210 is a 2U 6-Bay NVR storage appliance with the latest Intel® I3 processor and PROMISE enterprise-grade raid engine Vess A2210 is a 2U 6-Bay NVR storage appliance with the latest Intel® I3 processor and PROMISE enterprise-grade raid engine. Vess A2210 delivers low latency performance with bandwidth optimized for capturing and storing live feeds of high resolution video from Vos Logistics’ megapixel cameras. Vess A2210 is optimized for video surveillance recording, playback, live view and archive I/O access with incredibly steady and reliable behavior that limits dropped frames. Benefits Of The Vess A2000 Series The Vess A2000 Series is certified by Milestone for interoperability with XProtect VMS as it was verified to not only offer an optimized user experience, but it delivered over four times the performance required for certification with XProtect VMS. Vos Logistics were able to deploy the PROMISE and Milestone solution with confidence that the system will record and archive video reliably. The Vess A2000 Series supports the XProtect plug-in which allows Vos Logistics to manage Vess via the management user interface of XProtect - making it significantly more convenient for Vos Logistics to manage their storage. The Vess and XProtect architecture is highly scalable and could support any size system, which means Vos Logistics can easily add more capacity with Vess R2000 external storage when they need more warehousing space. Additionally, since the NVR appliance and external storage are both developed by PROMISE, it is a very simple and smooth process for Vos Logistics to grow their solution along with their security needs. “Every day we are faced with the need to protect millions of dollars of assets and infrastructure, so a reliable and optimized video surveillance solution is an absolute necessity,” said Toine van Gils, as Director Contract Logistics, Vos Logistics. “The solution we deployed from PROMISE, Milestone and Axis has been exactly what we needed and has performed beyond our expectations.” Save
Posco-Malaysia Sdn., Bhd. is the first electro-galvanising steel mill in Malaysia, operated by the world's fourth largest steelmaker, Pohang Iron & Steel Company (Posco) of Korea. A pioneer in electro-galvanising steel technology in Malaysia, the company built the new Posco-Malaysia factory in Pulau Indah, Klang, an island off the west coast of Selangor, Malaysia. It represents a significant development in the Malaysian steel industry, whose growth is driven by the international export market and by expansion of Malaysia's construction and electronics industries. CCTV Challenge With Posco’s closed-circuit television (CCTV) systems transitioning from analog and moving onto a network platform, the high-tech environment of the new steel mill sought a security system that incorporated IP-based network connectivity, enterprise-wide coverage and superior image quality. They also wanted a significant upgrade in system functionality while keeping the system cost low. Megapixel Solution Their new, state-of-the-art system uses a combination of 1.3, 2 and 3 megapixel cameras, as well as 8 megapixel panoramic cameras, all provided by Arecont Vision. Their camera models feature advanced capabilities such as day/night viewing and use H.264 video compression technology to minimize system needs related to bandwidth and storage. The video surveillance system at the Posco-Malaysia steel factory was designed by Sensorlink Sdn. Bhd., based in Kuala Lumpur, Malaysia, a supplier and solutions provider of advanced surveillance solutions for various industries. The system was designed by Sensorlink and was installed during construction by a Sensorlink business partner. The cameras are monitored locally using the GVD enterprise-class network video management system, which is designed as an end-to-end system incorporating high-definition video. One camera model used at Posco-Malaysia is the Arecont Vision Model AV1305, a 1.3 megapixel H.264 camera providing 1280x1024-pixel images at 32 frames per second. Features include a 1/2” CMOS sensor and Arecont Vision's MegaVideo® image processing at 80 billion operations per second. For high-resolution viewing, 24 hours a day, Posco-Malaysia uses the day/night version of the Arecont Vision Model AV2105, a 2 megapixel H.264 IP camera that provides 24 frames-per-second of 1600x1200-pixel video using a 1/2” CMOS sensor. The day/night version has a motorised infrared (IR) cut filter. The Posco-Malaysia installationdemonstrates the importance ofmatching the customer'sapplication and expectation ofimage quality For even higher-resolution needs, Posco-Malaysia uses the 3 megapixel model – Arecont Vision’s AV3105 – to provide 2048x1536-pixel images at 15 frames per second. The Arecont Vision cameras all use H.264 (MPEG 4, Part 10) compression to minimize bandwidth and storage requirements while maintaining real-time image resolution. Capabilities include motion detection, image cropping, region-of-interest viewing and forensic zooming. For a broader, high-resolution view, Posco-Malaysia uses the Arecont Vision Model AV8185, an 8 megapixel, 180-degree-view SurroundVideo® panoramic unit that uses four 2 megapixel sensors. The AV8185 is enclosed in a separate IP66 6-inch dome that can be wall-mounted or pendant-mounted. It incorporates an IP66-rated environmental chassis that needs no external housing. Megapixel Benefit As part of the security system at the Posco-Malaysia steel factory, megapixel cameras provide maximum functionality while helping to lower system costs. Video surveillance at the new steel factory uses megapixel cameras to provide detailed video images and the ability to zoom in to view regions of interest live or on recorded video. The playback video is critical for identifying suspect activity and liability claims. “The Posco-Malaysia installation demonstrates the importance of matching the customer's application and expectation of image quality to the right megapixel camera,” said Becky Zhou, Asia-Pacific Sales Director, Arecont Vision. “We are pleased that the system is running smoothly, and that our megapixel camera solutions’ performance has exceeded the customer's needs.” In every case, the integrators for Posco-Malaysia chose the exact right camera – ranging from 1.3 megapixels to the 8 megapixel panoramic camera – to match the expectations of the application. For example, the 8 megapixel camera can be used to view large areas while capturing megapixel detail, providing up to 6400x1200-pixel images at 5.5 fps, or it can be set for lower resolutions at higher frame speeds, such as 1600x1200-pixel images at 22 fps or 800x600-pixel images at 88 fps. The camera's panoramic view can be used in lieu of up to 24 analog cameras. The use of H.264 compression lowers requirements for bandwidth and storage and simplifies integration of higher-definition megapixel video. The application at Posco-Malaysia also demonstrates that megapixel cameras can dramatically decrease costs related to other elements of a system, such as fewer software licenses, less cabling, fewer lenses, and a decrease in the man-hours needed to bring it all together. “A major benefit of Arecont Vision cameras is their reliability,” said Terrence Ham, Sales Engineer (Systems Division) of Sensorlink, who also praised the superior image quality. “The use of megapixel cameras versus conventional imaging devices provides remarkable opportunities to realize a return on investment (ROI). The combination of the overall increased resolution and forensic capability using megapixel cameras and the lower system costs was irresistible for Posco-Malaysia.”
Customer Al Nabooda Automobiles is an authorized dealer and exclusive distributor of Porsche, Audi and Volkswagen with five luxurious showrooms and service centers across Dubai, United Arab Emirates and the northern emirates of Sharjah and Fujairah. Established in 1976, Al Nabooda is the world's largest Porsche dealer (based on number of vehicles sold) and operates the world's largest Volkswagen service center. Challenge As a leading dealership of luxury automobiles, Al Nabooda must provide a safe and secure environment for its employees and customers, and provide deterrents to minimize damages to vehicles in the showrooms, workshops and parking areas and prevent theft. To accomplish these needs, Al Nabooda introduced an enterprise-wide initiative to have a centralized physical security system. The executive management was looking for a comprehensive physical security solution that would allow remote monitoring of their facilities. The new video system would also need to meet a variety of specific performance requirements and withstand Dubai's sweltering heat. Additionally, Al Nabooda Automobiles’ management wanted to use the video surveillance system as a business tool to help analyze traffic and evaluate customer support initiatives. Megapixel Solution Al Nabooda Automobiles turned to Amir A. Kolahzadeh of ITworks, LLC, a Dubai network systems consultancy, design and build services company for their physical security system. Mr. Kolahzadeh’s solution for Al Nabooda Automobiles includes a variety of Arecont Vision cameras in the dealership’s various locations, including SurroundVideo AV8365DN and AV8185DN, day/night 8-megapixel H.264 cameras providing 360-degree and 180-degree panoramic views. These panoramic megapixel cameras provide a highly cost-effective solution by eliminating the need for mechanical pan-tilt-zoom (PTZ) devices and reduce the overall number of cameras necessary to provide detailed coverage of large areas. Several Al Nabooda Automobiles dealerships also have Arecont Vision AV1125IR 1.3 Megapixel H.264 MegaView IP cameras. These models are all-in-one day/night bullet-style cameras with a 4.5-10mm varifocal lens, weatherproof enclosure and infrared (IR). Cameras were positioned to view the dealerships’ sales floors and showrooms, workshops, parts and service entrances and other locations. A centralized security control center can remotely view live and recorded video from any camera at all locations. Higher resolution megapixel images enable the system to view small part numbers in stockrooms and workshops, and to track parts being transported from storerooms to workshops. Megapixel Benefits Megapixel video provides a cost-effective solution covering multiple sites. High-resolution images enable maximum coverage with fewer cameras, and low-light performance enables after-hours surveillance. Arecont Vision cameras use H.264 compression to provide megapixel video in lower-bandwidth streams to meet multi-site streaming and archiving requirements. H.264 compression also allows for 31 days of economical video storage. The camera enclosures' IP66 environmental rating for high humidity and outdoor installation can withstand Dubai's extreme temperatures.