The addition of network audio to surveillance systems brings benefits to both Axis partners and end users. For partners, network audio provides the potential for business growth with existing and new customers. For end users, audio enhances video surveillance systems in effectively deterring criminals whether intent of theft or vandalism. Adding audio to video surveillance works for a range of end users regardless of their size and sector, as it can be adjusted to meet a variety of applications.

It’s no secret that video surveillance has come a long way. When network cameras became mainstream in the mid-2000s they changed the game for video surveillance. The ability to connect cameras to an IP-based network delivered functionalities and capabilities beyond those of traditional analog video cameras and brought unprecedented flexibility and scalability to the surveillance sector.

Power of audio surveillance 

Network audio presents a step forward in technological capability and a sizable business opportunity

Network audio presents a similar step forward in technological capability, and an equally sizable business opportunity. As an enhancement to video cameras, it adds benefits in security and beyond. End users are discovering the value of adding audio to their video surveillance system in preventing incidents before they lead to expensive disruptions or loss.

As a result, the demand for audio is increasing fast, and the logical place for end users to seek advice and solutions is through their existing surveillance system provider. Adding network audio adds a range of possibilities in terms of reacting to events with appropriate audio messages in real-time.

IP surveillance system

Voice messages - whether live or pre-recorded in monitored surveillance or pre-recorded while unmonitored - can help end users stop the unwanted activity before it causes severe damage and it’s a powerful tool when it comes to deterring criminals. Network audio speakers can communicate with the rest of the IP surveillance system, leading to a coordinated response.

If an alarm is triggered through a video camera, for example through motion detection, there’s the option for operators to review the footage and launch the predetermined action plan. That could include sending a live voice message tailored to the incident and intruder or to play pre-recorded messages once an alarm is triggered. In particular, live messages from an operator often have a stronger effect on intruders. A message, such as “You in the gray hoodie and blue sneakers! You are not authorized to be in this area. Guards are on the way!” usually hits home.

Network audio systems

Unplanned downtime, stolen goods or damaged assets can be the result of an incident, leading to loss of earnings

Regardless of the size of the business or industry, damage caused by intruders can have a significant negative impact. Unplanned downtime, stolen goods or damaged assets can be the result of an incident, leading to loss of earnings. This is even more relevant for businesses which depend on tools and machines for their productivity, such as in the construction and farming industries.

A solution that combines network cameras and network audio in a security system provides a critical part of the security defense, protecting a range of businesses from the effects of adverse incidents. No matter if it’s small businesses or large enterprises, the audio solution can be tailored to the respective needs, in terms of devices as well as application.

Easy installation to operation

Using equipment that is based on open technology makes it easy to integrate audio speakers, even if another supplier has provided the end user’s VMS (video management software) and IP cameras. This openness also provides flexibility if the end user’s requirements change: more cameras or speakers can be easily added to or removed from the system and the kind of video analytics changed.

In addition, network audio leans on many of the skills already present in partners due to their expertise in network video: the similarities in the technologies mean that partners already possess the knowledge needed to easily add audio to video systems. The network audio system connects to already existing infrastructure so there is no need for extra cabling.

Flexibility and user-friendliness

These defined zones can be individually set up with cameras and speakers depending on the end user’s needs

By using PoE (Power over Ethernet) there is only need for a single standard network cable for connectivity, power and communication, which also makes installation and operation easy. On top of the easy integration into existing systems, network audio benefits from the user-friendliness of IP-based systems. It allows, for example, the monitored area to be divided into zones via audio management software that are included in the speakers.

These defined zones can be individually set up with cameras and speakers depending on the end user’s needs. In addition, the health status of the system can be monitored remotely so that operators can be confident that it is working at all times. Axis also provides regular software updates, ensuring that the system benefits from the latest functionality and features.

Complete surveillance system

The best scenario of end users and partners is when a technology genuinely enhances the capabilities and value of an existing solution, and offers the opportunity to broaden and deepen the commercial relationship between the partner and end user. The market is starting to see the value of network audio as a part of a complete surveillance system and it’s the perfect time for Axis partners to add audio to their portfolio.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

What Are The Positive And Negative Effects Of COVID-19 To Security?
What Are The Positive And Negative Effects Of COVID-19 To Security?

The COVID-19 global pandemic had a life-changing impact on all of us in 2020, including a multi-faceted jolt on the physical security industry. With the benefit of hindsight, we can now see more clearly the exact nature and extent of that impact. And it’s not over yet: The pandemic will continue to be top-of-mind in 2021. We asked this week’s Expert Panel Roundtable: What have been the positive and negative effects of Covid-19 on the physical security industry in 2020? What impact will it have on 2021?

Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More
Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More

Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.