ComNet Observation Kits(4)
Browse Observation Kits
Observation system products updated recently
The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain committed to keeping our people safe, while ensuring that our support and commitment to our clients are not compromised. Ensuring business continuity At AxxonSoft, our vision has always been to ensure business continuity through enhanced safety and video surveillance offerings. Adhering to the COVID-19 regulations, we are prescribing to social distancing to slow the spread of the virus. As such, we are utilising this time to ensure that our service offering is optimized to afford our clients the ability to repurpose and extend their remote working viabilities. As an essential service provider, we have ensured that we are providing the right tools to our clients to comply with regulations. Our video analytics and face recognition services have no reliance on on-site control rooms and, therefore, clients’ security solutions and personal safety are not compromised. Innovation reimagined During these precarious times, our focus remains on support and service. Our development team continues to work tirelessly to ensure that you can use our software during the lockdown and have accelerated innovation to this end. While we must maintain social distancing, we can and will still be of service to our community Therefore, we are proud to present version 4.11 of the Intellect PSIM, which offers our clients a neural network-based analytical tracker which recognises specific types of objects, such as humans and vehicles. We have also equipped this version with video wall management interface, automatic object tracking and a web reporting subsystem. Behavioral analytics generates data by detecting specific postures, like crouching, shooting or any potentially dangerous scenario. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement, offering a comprehensive bird’s-eye view to clients. This upgrade also upholds mandated social distancing measures and keeps any face-to-face meetings to a minimal. The silver lining is that you can even use this technology when the pandemic is over. Now that’s what I call experiencing the next with AxxonSoft! Finding solutions to the challenges Our specialist technology and frontline technical support staff will ensure that your business is protected during and post-lockdown. We will continue to ensure that we provide solutions to the new challenges that the coronavirus brings, ensuring that our clients can emerge stronger and more responsive to any changes in the future. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement While we must maintain social distancing, we can and will still be of service to our community. After all, change is not just about technology but about mastering mindsets. The COVID-19 disaster has demanded that businesses embrace tech disruptions as early as possible and apply technology in imaginative ways to define the new world of work. Until next time, stay safe!
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
ACRE brands Vanderbilt and ComNet have recently launched a giveaway of branded reusable face masks. The giveaway aligns with the return to work of many companies and employees across EMEA following the COVID-19 outbreak. There are many health and safety benefits to wearing a face mask, with reusable masks proving to be efficient and convenient for wearers. With this in mind, Vanderbilt and ComNet have decided to distribute free reusable face masks amongst their customer base. The masks are white in color with the Vanderbilt, ComNet, and ACRE logos branded on the center of the covering. Reusable face mask Masks have many proven health and safety benefits to help protect against COVID-19 in a simple and easy to adhere to manner" All one has to do to receive a Vanderbilt and ComNet branded reusable face mask is leave a short review on any Vanderbilt or ComNet product or service of one’s choice. Commenting on the giveaway, Ross Wilks, Head of Marketing Communications at Vanderbilt, stated: “As we open up like never before following the lockdown, ACRE wanted to contribute to people’s health and safety - aside from our many security products that enable solutions such as occupancy management, remote security management, contact trace reporting, pre-booking systems, and much, much more. We see reusable face masks as a quick and easy way to show our customer base that ACRE cares about their well-being. Masks have many proven health and safety benefits to help protect against COVID-19 in a simple and easy to adhere to manner. As such, we hope these free Vanderbilt and ComNet branded face masks will help contribute to our customer’s safety as they return to a better normal.” Terms of the giveaway Mask Giveaway Terms & Conditions: This giveaway is only applicable to the EMEA region. To receive one’s free mask, one must leave a product or service review for Vanderbilt or ComNet. Reviews must be usable. Vanderbilt has the final say in what is deemed a usable testimonial. Entrants will receive one mask per review. Vanderbilt will contact entrants after they leave a review to arrange delivery of their free mask. Therefore, please leave one’s full name and company name where prompted in one’s review. By leaving a review, an entrant is indicating his/her agreement to be bound by these terms and conditions. The giveaway is as stated, and no alternatives will be offered. The giveaway is subject to availability. By leaving a review, an entrant is indicating his/her agreement to have their testimonial used by Vanderbilt. Mask information Vanderbilt shall have the right, at its sole discretion and at any time, to change or modify these terms and conditions, and such change shall be effective immediately upon posting to the webpage. Vanderbilt also reserves the right to cancel the giveaway if circumstances arise outside of its control. Mask information: made of two layers of fabric with a compartment for an optional protective filter. The mask is reusable, and washable at 60 degrees. The material outside is 100% polyester and the material inside 100% cotton. Mask filters The masks have space for a protective filter. This is not included in the scope of delivery. The masks are made of two layers of fabric with a compartment for protective filters. The elastic ear loops are made of reusable rubber (washable at 60 ° C, suitable for ironing). The masks are made in the European Union. The masks are not a medical product and are not proven effective against infection. Most of the official "ffp2" and "ffp3" filters should fit into these masks without any problems. There is enough space for these filters.
One important feature for a copper extension product could be to maintain the network integrity. This ensures that the network speed (wire speed) of the link is maintained at either 100Mbps or 10Mbs and that the connection is fully symmetrical. By doing this it is possible to integrate units into an Ethernet network with complete confidence that the links in no way degrades the performance of the network as they operate at the chosen speed. It should also be added at this stage that the line speed selected does not have to be the data rate the user's traffic must pass at but rather the maximum data rate that the transmission path will support. The ComNet CopperLine range operates in this very way and supports extended distance transmission over either coaxial or twisted pair cable, with the coaxial medium specified at RG59 or better and the twisted pair CAT5 or better. Legacy coaxial installations Standards in coaxial cable can be many and varied and care should always be taken when looking to operate across it At 100Mbps distances extend to over six hundred meters on the minimum grade cable and if data rates are set to 10Mbps distances can be up to fifteen hundred meters on RG59 coaxial cable. The coaxial cable solution provides a simple migration path for analog end users with legacy coaxial installations who can run their new IP systems over the existing installed infrastructure. It is fundamental to the successful operation of the system that the cable parameters and quality meets or exceeds the type stipulated by ComNet. CAT5 cable must meet the ANSI/TIA/EIA-568 standard and RG59 coaxial should be of a quality construction. Standards in coaxial cable can be many and varied and care should always be taken when looking to operate across it. Power sourcing equipment Along with the data CopperLine also provides support for PoE at either the 15.4W (IEEE802.3af) or the 30W (IEEE802.3at) power levels1. Unfortunately passing power through copper cables is governed by the laws of physics2 and there is an inverse relationship between the distance and the power level that can be maintained across the link. At the 15.4W level CopperLine operates in a pass-through mode, where the devices outside of the CopperLine units (in the example below an Ethernet switch and IP camera) function as the PSE (Power Sourcing Equipment) and PD (Powered Device) respectively. CopperLine units can either be externally powered or via the PSE. Required minimum voltage These powering options provide total flexibility, by offering the simplest installation with everything powered from the central PoE switch or the ability to deliver maximum power levels to the camera by externally powering the CopperLine devices. The ability to provide the correct power levels at the PD will be dictated by the type and quality of the cable being used and also the voltage level present at the PSE. In the case of IEEE802.3af the required minimum voltage at the PD is 37Vdc and maximum voltage is 57Vdc When it comes to Ethernet switches that can operate as PSE devices the ability to increase the voltage level at the Ethernet port could be very useful. If the voltage levels can be increased, then there can be voltage drop in the cable but the voltage at the PD location could still be enough to power the connected device. In the case of IEEE802.3af the required minimum voltage at the PD is 37Vdc and the maximum voltage allowed at the PSE is 57Vdc. Significant game changer If the switch is one with a mains power input then it will tend not to have that ability and the level will be set at 48Vdc but if ComNet switches with dc input are used and the power supply can be increased on some models up to 57Vdc then the switch in turn will provide those levels. When the PD requires IEEE802.3at 25.5W power levels and a minimum voltage of 42.5Vdc then the game changes significantly. The ability to deliver 25.5W at 42.5Vdc from a central PSE offering 48Vdc at distances above 100m is impossible and so the design rational must change to that of the lower af levels. To accommodate this CopperLine PoE+ devices operate as PSE and PD devices through the link to negotiate with the Ethernet switch and camera respectively in the example shown. By configuring in this way, either of the CopperLine devices can be used as a power injector with voltage levels up to 57Vdc allowable at the device. For example, if the local (switch end) CopperLine unit was powered with 57Vdc it would supply passive PoE to the remote CopperLine device that would then fully negotiate with the connected PD to supply power.
ACRE brands, Vanderbilt and ComNet have announced the release of an Online Events and Learning page on their website. The launch of this new resource is in response to the current postponement of tradeshow events amidst the COVID-19 pandemic. Outlining what visitors to the Online Events and Learning page can expect, Ross Wilks, Head of Marketing Communications, Vanderbilt Industries explains “Our commitment is to make the customer’s security journey the best possible experience and that is what this Online Events and Learning page primarily focuses on. By taking a customer-first approach, we aim to highlight all of our customer-first value adds, such as our free online training services, multilingual customer service support, and free product demonstrations”. Award-winning security solutions He adds, “On top of this, we will also be hosting a series of webinars based on some of our most innovative solutions. These will be delivered by our in-house experts and will be a great opportunity for our customers to engage directly with some of the top minds behind these products in our company.” The Online Events and Learning approach by Vanderbilt and ComNet is built on a foundation of customer-focused core values such as empowerment, collaboration, and high performance. The current fruits of these core values will be on display for visitors to the Online Events and Learning page to see. For instance, detailed and engaging webinars on Vanderbilt’s award-winning products will include cloud-based solutions ACT365 and SPC Connect, plus intrusion system SPC and access control system, ACTpro. ACTpro access control system ACTpro, in particular, embodies the customer-first and high-performance approach being talked about ACTpro, in particular, embodies the customer-first and high-performance approach being talked about. It is a product that has continued to evolve based on customer requirements from the field, with its latest features including a “best-in-class” rules mapping engine and PoE Ultra controllers, plus Bluetooth readers and Biometric fingerprint readers that were recently added to the portfolio. “Our drive to become all-around solution companies has seen us harness numerous tools to complement a buyer’s journey from start to finish," Wilks said, adding "One prominent aspect of this strategy, which visitors to our Online Events and Learning page can also explore for themselves, is our webshop platform. This value-add has been available to our customers for less than a year, but already it has proved to pack a considerable punch in bringing about customer satisfaction to our base." Centralized Asset Management System The webshop optimizes the goal to serve customers 24/7. Accessed through Vanderbilt’s main website, the webshop presents a simplified, intuitive interface that makes it easy to navigate and use. How-to videos assist with any questions that may arise, and an improved product hierarchy and centralized Asset Management System (AMS) ensure all support materials are relevant and up to date. Upcoming webinars include: Vanderbilt CPD Event - Electronic Security (16-04-2020) Port Guardian & Implementation in Solutions (28-04-2020)
6 Questions To Ask When Choosing A Security SystemDownload
'Boosting On-Site Safety And SecurityDownload
Optimize Your Business with Analytics and AIDownload
Air Partner Company Redline Secures Four-Year Security Consultancy Contract To Support Align JV On HS2 Project
- Air Partner Company Redline Secures Four-Year Security Consultancy Contract To Support Align JV On HS2 Project
- Aiphone IX Series 2 Video Intercoms Deployed By French-Language College To Improves Security
- MOBOTIX Video Surveillance And Security Systems Secures The Schneider Group
- Panasonic Helps Reduce Hooliganism And Increase Safety At Danish Superliga Football Club Brøndby IF