Milestone Network Video Recorders (NVR) / Network DVRs(7)
Milestone Systems, the open platform company in IP video management software (VMS), announces upgrades to its series of Milestone Husky network video recorders (NVRs). The sleek video network appliances integrated with Milestone video management software now offer significant increases in internal storage. Popular NVR Series Meet Market Demands The storage expansions mean simple-to-install video surveillance solutions are available for more demanding requirements – longer video retention and greater quality recordings. More storage enables customers like government organizations to meet 90-day video storage requirements or casinos to achieve continuous high-resolution recordings. 2x the storage on the Milestone Husky M10 – up to 2TB (from 1TB) 3x the storage on the Milestone Husky M30 – up to 12TB (from 4TB) 2x the storage on the Milestone Husky M50 – up to 48TB (from 24TB) Additionally, the Milestone Husky Hybrid Series of NVRs will get a boost in storage too. The hybrid NVRs, which enables users to mix of analog and IP cameras for an easy analog-to-IP transition, offers the following options: 2x the storage on the Milestone Husky M30 Hybrid – up to 8TB (from 4TB) 2x the storage on the Milestone Husky M50 Hybrid – up to 32TB (from 16TB) Unlimited scalability through Milestone Interconnect Like other Milestone VMS solutions, Milestone Husky solutions are future-proof, enabling users to scale up their video surveillance deployments as their businesses grow. Multiple Milestone Husky M30s or Milestone Husky M50s can be set up with a master/slave configuration. Users can view video from all connected cameras on the networked Milestone Husky units by simply connecting to the master server. For enterprise scaling, all Milestone Husky NVRs can also use Milestone Interconnect™ to connect remote sites to XProtect® Corporate VMS for central command and control. This enables a site with a Milestone Husky NVR to be operated locally or remotely, which either could be through a central control center or by a service provided from a Milestone Partner. The functionality of the Milestone Husky M30 and Milestone Husky M50 models can be extended by integrating XProtect® add-ons and third-party integrations, such as access control and video analytics. “We recognized the shift in the market for integrated NVR solutions,” said Jay Shah, Global Business Development Director, Incubation and Ventures at Milestone Systems. “Our Milestone partners and customers asked us for more storage with the Milestone Husky Series and we delivered. Now they can integrate and interconnect the NVRs in more demanding environments. This change can only open up new opportunities for our end users and our integrators.”Add to Compare
The only Milestone-designed network video recorder (NVR) combined with high-end, XProtect advanced software, Milestone Husky M50 Advanced offers ultimate configuration flexibility and scalability, the open platform and premium features such as centralized management on an integrated appliance. Features: Optimized end-to-end video recording solution Advanced surveillance functionality with premium feature set Supported by XProtect® Smart Client, XProtect® Web Client, and Milestone Mobile Three-years of CARE plus is included with optional warranty extension Unique Husky Assistant onsite server configurator allows simple and reliable deployment of Husky Advanced models as an all-in-one or a recording server i7 CPU processing power Supports up to 120 cameras 10, 20, 40 and 80 camera base configurations Up to 48TB recording capacity with RAID10 or RAID4 includedAdd to Compare
Milestone Systems, the open platform company in networked video management software (VMS), is pre-announcing the Milestone Husky M500A NVR hardware platform with scalable VMS. The M500A XProtect Expert NVR has been performance-tested to support 512 HD cameras with a guaranteed recording performance of 600Mb/s. Milestone is currently preparing the Milestone Husky M500A for release in Q2 2016 and will be showcasing proof-of-performance at tradeshows in the meantime. Western Digital Purple Hard Drives The Milestone Husky M500A is building on the high performance exclusive hardware design of the Milestone Husky M50 chassis right in step with the previous Milestone Husky series. A key contribution to the NVR’s performance is the storage systems use of Western Digital Purple hard drives. These drives are specially designed for video surveillance and utilize write-optimized hard disk drive technology and frame loss protection. When combined with a video recording optimized RAID (Redundant Array of Independent Disks) Controller supporting either RAID 5 or RAID 10, the industry’s highest performance NVR in its hardware class is achieved. The M500A NVR supports up to 48TB of internal raw storage and has the ability to archive to network-attached storage appliances when additional storage is required. Milestone XProtect Expert VMS Preinstalled with highly scalable Milestone XProtect Expert video management software, the M500A NVR eliminates the guess work of sizing the recording hardware. This removes the common industry problem of over estimating and sizing IT server-based NVRs as well as saving time on systems design. The XProtect Expert VMS comes preloaded on the Husky M500A and enables a number of advantages for Milestone partners. These include already being trained and certified on the system software and being able to easily upgrade customers from previous Milestone XProtect products like XProtect Enterprise. Milestone Husky M500A will be sold in a base configuration only, so partners just add camera licenses as needed. Three years of Milestone Care Plus plan and hardware warranty are included in all units, enabling both free software upgrades, device license portability and software trade-in credit. This guarantees that customers get the industry’s lowest possible NVR total cost of ownership. Key Features Included Are: "The industry’s highest NVRperformance is delivered bythe most scalable and reliableVMS - all packed into ouroptimized NVR at the lowest cost per recorded device" Recorder or all-in-one: The Husky M500A can be utilized as a NVR which is a part of a larger video management software installation or as a stand-alone system. This gives partners and customers with the greatest number of deployment options form a single hardware platform. Federated NVR support: The Husky M500A XProtect Expert NVR can be easily Federated into existing XProtect Corporate customer deployments at no additional cost. This provides seamless management, configuration, control and viewing of camera devices. License portability: XProtect Expert 2016 base and device licenses can be moved between systems just by clicking in the Milestone management console. This enables a customer to have a pool of camera licenses and use them as needed. This solves the traditional problem where a system must be upgraded in chunks of licenses. It also makes scheduled maintenance easy. Recorder failover: When using the newest version of XProtect Expert 2016R2 the M500A can utilize the built-in recorder failover capability. This enables the M500A to fail over to a central XProtect Expert system or another M500A if the system is hit by an unforeseen outage. This takes place automatically, without any interruption in system security level. Simplified installation and setup: The Husky Configurator automates the hardware and software setup and system restore image. This saves valuable installation and setup time. “The industry’s highest NVR performance is delivered by the most scalable and reliable VMS - all packed into our optimized NVR at the lowest cost per recorded device. It does not get better than this!” says Bjørn Skou Eilertsen, Vice President of Corporate Products Business Unit at Milestone Systems. “The Milestone Husky M500A is yet another proof-point of our commitment to delivering the most valuable solutions for our partners and customers.” The Milestone Husky M500A proof-of-performance was showcased at the ISC West International trade show in Las Vegas, April 6-8, at the Milestone booth 20060 where visitors saw the live performance test of 512 HD cameras being recorded on the new Husky M500A XProtect Expert NVR.Add to Compare
Milestone Systems is proud to introduce the all new Milestone Husky Series. Performance-optimized network video recorder (NVR) solutions that never compromise on quality. Why choose a Milestone Husky NVR solution? Fast to deploy and ready-to-use in just a few minutes User-friendly, plug-and-play solution Perfect match between reliable, industry-leading software and industrial grade hardware Installed with Milestone video management software (VMS), proven in thousands of installations worldwide A selection of performance-optimized solutions designed to suit a range of user needs Flexible viewing clients for on-the-go and remote access Use Milestone Interconnect™ to connect Milestone Husky NVRs at remote sites to XProtect® Corporate for centralized management Connect multiple Milestone Husky M30 or M50s with a master/slave configuration and view video from all connected cameras by simply connecting to the master server Choose from more than 50 preconfigured options and use add-on licensing for a customized solution M30 and M50 are compatible with XProtect Smart Client®, all XProtect add-ons and third-party integrations to create a wide variety of business solutions Includes free Customer Dashboard to enable your installer to monitor the health of your system and proactively resolve technical issuesAdd to Compare
Browse Network Video Recorders (NVR) / Network DVRs
Network Video Recorder (NVR) products updated recently
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing Humans From Animals And Statues The AI system continuously analyzes video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting People’s Privacy With AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search Versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages Of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common Use Cases Of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient design includes a Master Access Controller (MAC) as an additional layer of defense between the server and the access controllers. If the server fails, the MAC takes over, ensuring continuous communication across controllers while sharing necessary information from the card readers. In addition, access control functionalities that involve multiple access readers, such as anti-passback and guard tour can continue to perform. The anti-passback functionality is an important feature to ensure a high level of security. It prevents a cardholder from passing a card to another person enabling an unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route at specified times. Threat level management The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked Any deviation of sequence or timing causes an alarm in the Access Management System. Immediate notifications to colleagues or first responders increase the safety of security guards. In the rare event that both the Access Management System 3.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers (AMCs). Thanks to this offline capability, it is possible to save millions of events even during downtimes, ensuring the continuous availability of the system. Access Management System 3.0 offers up to 15 configurable threat levels such as lockdown, controlled lockdown, or evacuation, which means safety measures can be initiated quickly in critical situations such as fire or security breach. The threat level state is activated by one of three triggers: operator workstation, external contact such as an emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked. Scalable and future-proof Users can start small and add extra capacity whenever necessary. The Access Management System 3.0 software can be expanded up to 10,000 doors and 200,000 cardholders. The software is offered in three pre-configured software bundles from medium to large organizations: Lite (max. 144 doors), Plus (max. 512 doors), and Professional (max. 10,000 doors). All bundles support up to 200,000 cardholders. No hardware needs replacing when expanding; users only require software upgrades and possibly additional controllers, readers, and cards. So, increasing the system is also cost-efficient. Customers who work with the software solution Access Professional Edition (APE) from Bosch can migrate to the Access Management System 3.0 by using the new importer/exporter tool. Together with regular updates to data security enhancements, these features make the system a future-proof investment - suitable for office and government buildings, retail environments, educational institutions, and more. Easy configuration and operation Access Management System 3.0 also has trusted digital certificates for mutual authentication Configuration is easy: Users can import existing floor maps into the system, and drag and drop icons on the map to represent controllers, doors, and building objects. User onboarding is straightforward. For example, enrollment and assignment of access profiles are all implemented in one dialog manager. Operation is smooth: The graphical user interface (GUI) is simple and easy to understand. The dark color scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. Access Management System 3.0 offers protection against cybercrime and loss of personal data. The database, as well as the communication between the server and access controllers, is encrypted at all stages through the support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 3.0 also has trusted digital certificates for mutual authentication between the server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege.” Integration with third-party solutions Access Management System 3.0 is ideal as a standalone solution to meet today’s access control needs. It integrates seamlessly with Bosch B Series and G Series intrusion control panels as well as with video systems such as Bosch Video Management System or third-party systems like Milestone’s XProtect for increased security and enhanced situational awareness. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly Integration with Bosch Video Management System (version 10.1 and higher) offers manual video verification to increase the security level at doors. The operator can visually verify whether the person at the door matches the registered person in the database. If so, the operator allows the person to enter. Bosch Video Management System integration also enables searching for cardholder events and events at doors. With the searching functionality, it is possible to quickly check who has entered an area and at what time. Moreover, access commands and events can be handled in Bosch Video Management System, making the operation of the integrated system most efficient. Intrusion control panels integration B and G Series intrusion control panels integrate seamlessly into Access Management System 3.0 for efficient authorization management and a central overview of all access and intrusion events. With central user management, operators can add, delete, and modify intrusion-related user passcodes and authorizations directly into the system, as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly in the Access Management System 3.0 user interface as well as to see states of the areas (e.g. “armed”, “ready to arm”) and detectors (e.g. “motion detected”) on the system map. This provides operators with a central overview of all access and intrusion states, allowing them to easily and remotely handle intrusion events. Bosch Access Management System 3.0 is available for sale and makes access management simple, scalable, and always available.
When overseeing the installation of video surveillance in a refinery, it is necessary to understand that there are a number of complex issues that must be resolved. The infrastructure is, generally, very large and presents a series of extremely dangerous environments and processes that must be closely monitored in order to ensure that the numerous manufacturing operations taking place are carried out safely. Monitor large complex One of the customers in Mexico has asked for a system that enables them to monitor these complex operations in real time, so that precautionary action can be taken, if necessary. The system has to show the work that PEMEX staff and all suppliers within the processes area are undertaking in order to avoid risky situations and ensure that all jobs are performed in accordance with safety standards. In addition, the system needs to be able to show various parts of infrastructure, such as instruments, valves, pipes, etc. and detect any malfunctioning production equipment. In some places, production processes must be monitored as they occur in zones made hazardous by the presence of flammable substances. The customer’s top priority is being certain that the installed cameras themselves are not a possible ignition source for flammable products in the surrounding areas. Explosion-proof PTZ IP cameras The integrator REX ENTERPRISE S.A. de C.V. carried out two projects with these characteristics in Mexico: one in Coatzacoalcos, Veracruz and the other in Poza Rica, Veracruz. In Poza Rica, Milestone software manages the system’s 51 devices, including IP cameras for internal monitoring, analog cameras from a previous system and 22 explosion-proof PTZ IP cameras. Milestone has been chosen due to its ability to integrate a number of alarm systems, analytic systems, etc. in the future, as it wasn’t possible to fund and use the complete system at the time of installation. ONVIF protocol Videotec's explosion-proof PTZ cameras were selected for their unlimited lifespan, with three-year warranty, their corrosion-resistant construction and their conformation with all the applicable standards for explosion-proof devices. The integration of Videotec products and Milestone is guaranteed by the ONVIF protocol. ONVIF is a worldwide industry standard that offers standardized interfaces and promotes effective interoperability of physical safety products.
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced a line of 4K AI cameras. Part of the Wisenet P series, the new AI-based cameras capture pristine images at up to 4K resolution while including powerful, in-camera deep learning algorithms for advanced object detection, classification and error-free analytics. Utilizing object recognition versus motion detection all but eliminates false alarms while also providing valuable business and operations insight. AI cameras analytics “Our new AI cameras have solid performance in both analytics and deep learning applications,” said Ray Cooke, Vice President - Products, Solutions, and Integration, Hanwha Techwin America. “The included, license-free analytics detect and classify a range of objects including people, vehicles, license plates, and faces. This technology will provide more reliable edge based intelligence, and open new opportunities in security as well as business and operations intelligence.” Unique attributes of the objects are also stored as metadata alongside the video information including: Colors of people’s clothes for both top and bottom People’s clothing length for both top and bottom People wearing of glasses or not People wearing or carrying a bag Age group Gender Vehicle types Vehicle colors Hanwha’s plugin for Video Management Software This metadata can be read by a VMS server and used in post-event forensic search to significantly reduce time spent investigating specific events. Wisenet P series AI cameras offer integration with Wisenet WAVE and other popular VMSs from Milestone and Genetec using Hanwha’s plugin. As businesses re-open with new policies regarding social distancing and occupancy limits, it’s never been more important to accurately count customers and employees as they enter and exit the premises. Unlike traditional, imprecise methods of people counting with dedicated overhead cameras, the Wisenet P series AI cameras deliver the accuracy with people counting based on the camera’s AI object detection algorithm. Reducing Server bandwidth for analytics Wisenet P series AI cameras are equipped with a ‘BestShot’ feature which ensures that only the most suitable image of classified objects is sent to a backend server. The full video image can be up to 4K resolution to see details of objects, along with tagged attributes metadata. Users have the option to set the image resolution to less than 4K for full video streaming or use BestShot to minimize bandwidth and storage requirements for server-based analytics. Additional key features include: Digital auto-tracking: provides two simultaneous streams of video, enabling operators to see the camera’s full field of view, while simultaneously viewing a Full HD digital PTZ auto-tracked image of a person or vehicle Upgraded Business Intelligence: integration with Wisenet Retail Insight providing gender and age group counting 12V DC power supply (50mA max): provides power for external sensors including LEDs, PIR sensors, and glass break detectors, eliminating the need for an additional power supply AI Dome cameras series The new Wisenet P series AI cameras are available in the following configurations: PND-A9081RV – 4K AI dome camera with built-in IR illumination PND-A9081RF – 4K AI flush-mount AI dome camera with built-in IR illumination PNV-A9081R – 4K AI vandal-resistant dome camera with built-in IR illumination PNO-A9081R – 4K AI bullet camera with built-in IR illumination PNB-A9001 – 4K AI box camera
Related white papers
Five Things To Consider For AI With Video Technology
Making Your Surveillance Cyber Secure
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload
Salient Systems Provides A Reliable Security Solution To Enhance Healthcare Security At The SwedishAmerican Health System
Teleste Corporation To Install Video Surveillance And Public Announcement Systems In Stadler’s FLIRT Trains
- Salient Systems Provides A Reliable Security Solution To Enhance Healthcare Security At The SwedishAmerican Health System
- Teleste Corporation To Install Video Surveillance And Public Announcement Systems In Stadler’s FLIRT Trains
- Dahua Technology Provides Low-Light Security Solutions To The New Athos Cave In Georgia
- IDIS Video Surveillance Solutions Strengthens The Video Infrastructure Of Newman University