Video Surveillance Storage System / HDD(557)
The FUJINON SX800 camera system marks FUJIFILM's successful entry into the surveillance systems market. FUJIFILM presents the new long-range camera module FUJINON SX800 to the surveillance systems market. With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality. Thanks to its powerful 1/1.8" image sensor, the long focal length range of 20 mm to 800 mm and state-of-the-art image processing technology, the FUJINON SX800 is ideally suited for aerial surveillance. In modern society, the security needs of citizens are constantly increasing. Surveillance cameras with long focal lengths are not only used to address sensitive issues such as border security but are increasingly being incorporated into public infrastructure such as airports, seaports and motorways. Long range surveillance systems must cope with special challenges. For optics with long focal lengths, the smallest vibrations are sufficient to compromise the image information. Heat haze or fog in the air also impair image quality. And, a focus drive that is too slow leads to safety-relevant information loss. However, with the development of the new FUJINON SX800, FUJIFILM has found a way to minimize the impact of these challenges. Instead of developing a surveillance camera and a separate matching lens, the concept of a fully integrated system consisting of camera and lens has been realized. In addition to the high-quality zoom optics, the FUJINON SX800 has a powerful combined optical and electronic image stabilization mechanism that provides angle correction of up to ±0.22 degrees. The integrated high-speed autofocus provides a sharply focused image in less than a second, while a fog filter and heat haze reduction technology helps prevent weather interference. The system provides consistently sharp images – even of objects several kilometers away. In addition, the integrated design of the new FUJINON SX800 reduces the high adjustment effort normally required for camera installation. As of Q3 2019, the FUJINON SX800 will be available as both a mobile stand-alone device and as a system that can be integrated into a pan-tilt head.
March Networks Searchlight for Retail enables all types of retail organizations – including specialty retail, grocery stores, quick service restaurants (QSRs) and convenience stores (c-stores) – to reduce losses from theft, oversee operations, improve customer service and increase profits. The intelligent software integrates clear surveillance video with data from retail systems including point-of-sale (POS) and RFID tags to alert loss prevention staff and business owners to instances of potential theft, and reduce investigation times from hours to minutes. In addition, Searchlight’s optional business analytics (e.g. people counting, dwell time monitoring and queue length) combined with video data provide valuable insights on occupancy, speed of service, transactions conducted with no customer present, and customer interest. Available as a standalone software application, or as a hosted software as a service (SaaS) for a low monthly fee, Searchlight for Retail delivers key benefits to retailers including: Transaction Summaries. View and compare user-definable report summaries (voids, refunds, discounts, etc.) to identify potential issues based on transaction trends over time. Transaction Reports. Review transaction data integrated with video to quickly investigate instances of potential internal theft, and to evaluate employee behavior at the POS. Business Analytics. Uncover customer trends and employee Key Performance Indicators (KPIs), and gain insight into overall store or restaurant operations. Operations Audits. Review snapshots from the cameras at your locations to see what’s happening, and discern operational issues like cleanliness, safety concerns, placement of promotional displays, etc. Business Rules. Detect possible fraud by reviewing lists of transactions and events that are important to you, e.g., no sales, safe drops, and transactions that exceed a certain amount, and be automatically alerted about these events via email. Security Audits. Filter by location ID and/or alarm type, and view alarm video from the vantage point of one or multiple cameras; export alarm details along with relevant video and audio evidence. Integrate your video surveillance system with leading POS and RFID software. A portfolio of POS and RFID integrations are available off-the-shelf; customized integrations can be configured as needed.
System OverviewFeaturing powerful optical zoom and accurate pan/tilt/zoom performance, the camera provides a wide monitoring range and great detail. The camera delivers 1080P resolution at 25/30fps. The camera is equipped with smooth control, high quality image, and good protection, meeting compact size demands of video surveillance applications. Functions Starlight TechnologyFor challenging low-light applications, Dahua’s Starlight Ultra-low Light Technology offers best-in-class light sensitivity, capturing color details in low light down to 0.005 lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. EnvironmentalDahua cameras operate in extreme temperature environments, rated for use in temperatures from -30°C to +60 °C (-22 °F to +140°F) with 95% humidity. Subjected to rigorous dust and water immersion tests and certified to the IP66 Ingress Protection rating makes it suitable for demanding outdoor applications. ProtectionThe camera allows for 4KV lightning rating,which provides effective protection for both the camera and its structure against lightning. InteroperabilityThe camera conforms to the ONVIF (Open Network Video Interface Forum) specifications, ensuring interoperability between network video products regardless of manufacturer. Wide Dynamic RangeThe camera achieves vivid images, even in the most intense contrast lighting conditions, using industry-leading wide dynamic range (WDR) technology. For applications with both bright and low lighting conditions that change quickly, True WDR (120 dB) optimizes both the bright and dark areas of a scene at the same time to provide usable video. Smart H.265+Smart H.265+ is the optimized implementation of the H.265 codec that uses a scene-adaptive encoding strategy, dynamic GOP, dynamic ROI, flexible multi-frame reference structure and intelligent noise reduction to deliver high-quality video without straining the network. Smart H.265+ technology reduces bit rate and storage requirements by up to 70% when compared to standard H.265 video compression.
System OverviewFeaturing a dual lens Pan/Tilt/Zoom (PTZ) camera, this series provides an all-in-one solution that is especially beneficial for long distance video surveillance in outdoor applications. Together with Dahua Thermal and Starlight technology, the camera’s long range capabilities are able to be utilized even at night. The series combines one thermal camera for monitoring in total darkness and one camera with Starlight functionality and a motorized lens for confirming details up close. Functions Uncooled Vox TechnologyDahua thermal cameras use uncooled Vox sensor technology. Their small size and better performance make them a cost-effective solution for thermal security. High SensitivityHigh thermal sensitivity (<40mK) allows cameras to capture more image details and temperature difference information. Fire Detection & AlarmWith built-in fire detection functionality, the camera has the ability to detect fires from long range. Because thermal cameras are sensitive to temperature, they provide higher fire detection accuracy than standard cameras, making them particularly fit for applications such as forest fire prevention. Intelligent Video System (IVS)IVS is a built-in video analytics algorithm that delivers intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. A camera with IVS quickly and accurately responds to monitoring events in a specific area. EnvironmentalWith a temperature range of -40 °C to +70 °C, the camera is designed for extreme temperature environments. Subjected and certified to rigorous dust and water immersion tests, the IP66 rating makes it suitable for demanding outdoor applications. For enviorments with rain, sleet, snow and fog, an integrated wiper(optional) provides users with clear visibility at all times. ProtectionThe camera Supporting wide range voltage input(100–300V AC), suitable for the most unstable conditions for outdoor applications. Its 6 kV lightning rating provides effective protection for both the camera and its structure against lightning.
Increase safety and reduce risk on board your transit vehicles with March Networks® RideSafe MT Series IP Recorders. These all-IP units deliver highly-reliable video surveillance recording and management in a compact, rugged design that is ideal for mid-sized vehicles – like student and patient shuttles and paratransit buses. Available in 4-channel and 6-channel models, the RideSafe MT Series solution enables operators to capture everything that’s happening on the bus, inside and out. Whether you have one or a thousand vehicles, this plug-and-play recorder can operate as a standalone unit programmable through embedded software, or be remotely managed and monitored daily using March Networks Command™ for Transit video management software. Video from the recorder can also be integrated with existing CAD and AVL systems and mobile routers. Key RideSafe MT Series features include: Front panel LEDs for easy recorder diagnostics, including operational, recording and video export status Embedded Linux OS, to ensure reliable and secure video recording Real-time health monitoring, alerting operators to camera, recorder and network issues before they affect performance Vehicle metadata integration from CAD/AVL systems and accelerometers for accurate re-enactments, driver monitoring and investigations Configurable recording policies based on schedule, motion, incident/event and other user-definable variables Powerful video management software, providing the advanced tools and features needed to manage entire fleets Automated video and data extraction over WiFi or 4G networks Extended thermal range (ETR) models available
The Evolution 180 Outdoor Camera is built upon Oncam’s expertise and heritage on 360-degree technology. It is specifically designed for applications that require a dewarped panoramic view of an outdoor scene, without blind spots, from a single sensor camera. The 12MP high-resolution sensor and the built-in 3D dewarped panoramic video provides industry leading Panoramic+ views. The true day/night functionality allows images to be produced in all lighting conditions, including additional IR lighting. The camera is IP66, IP67, IP68, IP69K and IK10+ rated, making it a robust design. Its versatile enclosure enables wall and pendant mounting, while the integrated adjustable mounting allows for an angling of up to 45°. When angled, Oncam’s Angle Compensation Technology (ACT) corrects the view, straightening vertical lines in the scene.
VIVOTEK’s FE9391-EV is a market-leading H.265 12-megapixel day-and-night Deep Learning fisheye network camera, featuring a detailed 12-megapixel CMOS sensor which guarantees superb image quality and 360-degree surround views with zero blind spots. Accurate people detection capability Base on VIVOTEK’s people tracking AI engine, the FE9391-EV is equipped with accurate people detection capability which only people activities will serve as event triggers. Furthermore, armed with VIVOTEK’s self-developed Deep Learning Smart 360 VCA technology, the FE9391-EV provides new functionalities including Intrusion Detection, Crowd Detection, and Loitering Detection. These features are the next steps in elevating surveillance cameras from image capturing devices to advanced notification instruments, allowing users to significantly reduce false alarms. Anti-intrusion software To respond the rising cyber risks of IoT device, the FE9391-EV is embedded with Trend Micro’s anti-intrusion software with multi-layer protection, including brute force attack detection, intrusion detection & prevention, and instant damage control. Users can obtain higher cyber security protection and minimize cyber risks of surveillance network. Working together, these advanced features ensure the new smart fisheye camera FE9391-EV is both highly intelligent and robustly secure. Panomorph lens technology The FE9391-EV's use of the latest in panomorph lens technology has led to much improved image quality with a huge drop in edge distortion. It is also updated with the latest in IR illumination, VIVOTEK's Smart IR II technology with Adaptive IR. Adaptive IR enables the FE9391-EV's IR illuminators to adjust to the scene together or individually to provide the best possible IR image, reducing glaring hotspots and/or underexposed dark spots. It is an ideal camera for the open areas such as airports, shopping malls, parking lots, retail stores, offices and more.
The new DC-C4212RX 2MP micro dome camera is the latest addition to the DirectIP® line up from IDIS, which is South Korea’s largest in-country manufacturer of surveillance technology. The compact design of the DC-C4212RX makes it the best choice for understated, less noticeable installation. The neat aesthetics are ideal for applications where there is a need for unobtrusive surveillance but where comprehensive, high-performance video capture is paramount. Measuring only 86 mm x 58 mm and weighing just 105 grams, the DC-C4212RX delivers advanced benefits within its lower profile and is the right choice for high-end locations such as jewellery shops and boutiques, as well as up-market restaurants and luxury hotels. The DC-C4212RX offers all the key benefits that installers expect from IDIS DirectIP dome cameras, including the company’s signature plug-and-play installation and configuration. The elimination of a pigtail cable allows faster and easier deployment. The 3-axis mechanical lens enables rotation and easy angle adjustment, making it an important design feature for precise image capture, particularly when the camera needs to be discretely wall-mounted. The camera can also operate in a wide range of lighting conditions, delivering high performance live monitoring and playback. Other key features include true wide dynamic range (WDR); IR LED illumination up to 15m with day and night ICR; dual codec H.264/H.265 performance; and easy, plug-and-play integration with IDIS VA in the Box. This cost-effective video analytics appliance delivers value-add business intelligence gained from heat mapping, people counting, queue management and comprehensive reporting. “Our new micro dome is a great camera for installers to work with and it delivers outstanding surveillance capability for customers,” says James Min, Managing Director of IDIS Europe. “It further strengthens our end-to-end offering for retail applications, including high street fashion, boutiques, dining, pubs and coffee shops - markets in which we have gained significant market share globally.”
AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables Dahua AI-series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc. The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and more devices. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System Overview With CNN algorithm, Dahua AI positioning system supports intelligent functions like tripwire and intrusion; and supports video metadata function that recognizes motor vehicle, non-motor vehicle, and human to analyze their detailed information. With PFA algorithm, the speed dom e can get clear images all the time during zooming. Together with infra red illumination and Starlight technology, the camera is the perfect solu tion for dark, lowlight applications. Perimeter protection Automatically filtering out false alarms caused by animals, rustling leaves, bright lights, etc. Enables system to at secondary recognition for the targets. Improving alarm accuracy. Starlight Technology For challenging low-light applications, Dahua;’s Starlight Ultra-low Llight Technology offers best-in-class sensitivity, capturing color details in low light down to 0.001 lux. PFA Technology PFA technology has innovatively introduced new methods of judgement to ensure the accuracy and predictability of the direction of subject distance adjustment. The result is a set of advanced focusing algorithms. PFA ensures clarity of the image throughout the process of zooming and shortens focus time. Environmental Dahua cameras operate in extreme temperature environments, rated for use in temperatures from -40 °C to +70 °C (-40 °F to +158 °F) with 95% humidity. Subjected to rigorous dust and water immersion tests and certified to the IP67 Ingress Protection rating makes it suitable for demanding outdoor applications. Protection The camera allows for ±25% input voltage tolerance, suitable for the most unsuitable conditions for outdoor applications. Interoperability The camera conforms to the ONVIF (Open Network Video Interface Forum) specifications, ensuring interoperability between network video products regardless of manufacturer. Wide Dynamic Range The camera achieves vivid images, even in the most intense contrast lighting conditions, using industry-leading wide dynamic range (WDR) technology. Auto-tracking This feature controls the pan/tilt/zoom actions of the camera to automatically track an object in motion and to keep it in the scene. Smart H.265+ Smart H.265+ is the optimized implementation of H.265 codec that uses a scene-adaptive encoding strategy, dynamic GOP, dynamic ROI, flexible multi-frame reference structure and intelligent noise reduction to deliver high quality video without straining the network.
Hikvision has released a new Thermal Bi-spectrum Deep Learning Turret Camera, which will bring enhanced capabilities of indoor fire detection, including an advanced temperature anomaly alarm and visual warning. This new cost-effective camera (DS-2TD1217/V1 Series) reduces the risks of fire and property loss. Bi-spectrum image technology Hikvision’s Thermal Bi-spectrum Deep Learning Turret Camera supports fire detection using high-quality internal hardware components to capture images using both visible light and infrared light, also called “bi-spectrum” image technology. The bi-spectrum image technology creates a picture-in-picture preview and image fusion, which can capture what caused the alarm and help personnel to check the situation quickly. It monitors through only one channel, reducing bandwidth and simplifying the live preview procedure of switching channels between thermal and optical channels. The bi-spectrum image fusion function also provides more image details under different environmental circumstances, making it easier to find hidden objects and document unusual events. The camera's image processing technology combines multiple image processing techniques to create the best thermal imaging results. It also utilizes a “noise equivalent temperature difference” (NETD) of less than 40 mK (this is a measure for how well a thermal imaging detector distinguishes between minute differences in thermal radiation within an image). This means that the lower the temperature difference sensed by the camera, the smaller the value and the better the image. Temperature anomaly alarm This new thermal camera also features a reliable temperature anomaly alarm, which will trigger an alarm once the temperature goes higher than a user-set limit. This setting effectively improves the pre-warning capability before a fire occurs, and can alert safety personnel to eliminate hidden dangers before the temperature reaches ignition or combustion. In a practical application, it can help to detect smoking behaviors in the first place, especially for areas that are clearly prohibited from smoking like shopping malls or that are heavily banned like oil depots. Through effective alarms, staff can find and stop the person from smoking in time to reduce environmental pollution or fire damage caused by smoking. Reduce false alarms with Deep Learning In addition, the camera contains a built-in GPU for running the deep learning algorithm to effectively help indoor monitoring and detect illegal intrusion. Its intelligent video content analysis technology can help reduce false alarms by filtering out interference factors such as changes in lighting or movement of animals in the field of view. Only actual threats trigger alarms, making security measures vastly more efficient and preventing unwanted entry. Equipped for double-duty – fire detection and intrusion detection – this camera is highly recommended for use in indoor fire detection and intrusion detection solutions, especially in application scenarios such as warehouses, museums, data centers, and banks. Wide viewing angle (up to 90 degrees) along with relatively small and well-designed camera housings make them easy to install and convenient to use.
The Contera NVR Appliance from Arecont Vision Costar is designed to offer powerful IP recording in an affordable, compact chassis. The Contera NVR Appliance is equipped with an on-board 8 or 16 channel PoE switch, that can be upgraded to 24 channels, allowing for Plug and Play connection with ConteraWS® or ONVIF cameras. With full integration to ConteraWS Web Services, the Contera NVR Appliance offers centralized user management, single sign-on convenience, mobile apps and a web client that allows for easy remote connection to your recorders. Network setup is fast and easy using ConteraWS Web Services, and eliminates the need for port forwarding or DDNS. The Contera NVR Appliance runs on a secure Linux OS and comes preloaded with ConteraVMS® Server software as a turnkey solution.
AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc. The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System Overview Dahua IVSS goes beyond the ordinary NVR products. It is an Intelligent Video Surveillance Server combines video management functions with traditional video storage operations in one device. Besides the basic functions as network video recorder, IVSS is integrated with features such as face detection, face recognition for different business and industrial applications. With build-in deep learning module, IVSS series products adopt video image structuring technology based on deep learning algorithms, achieving high-precision human face recognition and perimeter protection. By applying deep learning artificial intelligence, IVSS allow users to focus on what matters most, improve event response time and help make video actionable. An all new UI design supports device operation and maintenance management, improving the value and experience of surveillance view, and servicing the era of security big data. Functions Face RecognitionSupport record faces by structured data and real-time crosscheck with incredible accuracy to figure out the face with target features. With regular/Stranger mode to trigger kinds of alarm actions for different applications. Perimeter ProtectionAutomatically filtering out false alarms caused by animals, rustling leaves,bright lights, etc. Enables system to act secondary recognition for the targets. Improving alarm accuracy. Video MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Currently, there are four main kinds of metadata in the security industry: human face, human body, and motor vehicle and non-motor vehicle metadata. AI SearchSupport search by metadata of human and vehicles. Support uploading face pictures to NVR and compare them with recorded faces in NVR by similarity. Enable operators to quickly and easily search through multi channels and long duration, efficiently find out when and where a person of interest appeared.
IDIS has launched the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and Smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy. The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market-responsive innovation and meets installer and end-user requests for a more compact 360° camera that can capture high-definition images in all lighting conditions without blind spots. It also lets customers to benefit from heat mapping without the hassle and cost of additional appliances or analytics software. A broad, high-specification camera, in a compact form, the new Super Fisheye 5MP builds on the success of earlier IDIS’s Super Fisheye cameras, including the award-winning 12MP DC-Y3C14WRX. It meets industry demands for clear and accurate image capture, long-term performance and reliability, exceptional de-warping, and a low total cost of ownership. “The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance and is already contributing to successful project wins for our integration partners in retail applications, eating-out sectors, education, healthcare and other environments where customers benefit from cost-effective and simple to use analytics. “Its high performance 360° capability means it can replace multiple fixed-lens cameras and provide complete and clear image capture in a variety of lighting conditions. For our integrator partners, IDIS’s value proposition, fast and seamless installations and performance guarantees have the potential to increase margins, while end-users benefit from savings in terms of lower upfront equipment and installation costs, with reduced maintenance expense and video storage burden,” said James Min, Managing Director, IDIS Europe. The IDIS 5MP IR Compact Fisheye features include: IDIS Smart UX Controls for very high accuracy and ease-of-use, with intuitive “rubber-band” style control to deliver a new level of operator experience. Super smooth de-warping on the camera as well as on desktop applications and mobile devices for added convenience and out-of-hours monitoring. Quick Controls allowing operators to use the CTRL button with a combination of left, right, and wheel mouse clicks for easier and faster investigations. Full protection against video loss thanks to built-in IDIS Smart Failover guaranteeing continued recording in the event of network instability, overload or failure. IDIS Intelligent Codec that delivers H.264/H.265 dual codec performance and significant bandwidth and storage savings, while eliminating the need to upgrade hardware. Quick and simple installation with DirectIP NVRs and true plug-and-play functionality. Reduced potential for cybersecurity loopholes with one-click configuration eliminating the need to manage individual passwords for multiple devices. Heat-mapping to more easily identify hot-spots, dead zones and bottlenecks in retail and eating-out sectors. Intelligent video and event trigger functions including motion detection, active tampering and trip zones. “The IDIS Super Fisheye 5MP Compact camera also scores highly on essential features including, built-in LEDs for IR operation in full darkness (up to 15m); 8 zone privacy masking; true wide dynamic range; ONVIF support; built-in speakers and microphone allowing 2-way communications; industry-leading 5-year free warranty. All these factors come together to deliver a lower cost of ownership to our customers,” continued James Min. IDIS offers an end-to-end, single sourced video offering that delivers unrivalled plug-and-play simplicity, combined with highest-quality performance, compatibility, and a low total cost of ownership and features industry-leading warranties. IDIS will be demonstrating its Super Fisheye range and Total Solution line up12 at IFSEC International on 18-20 June at ExCeL, London, UK.
Dahua AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, Metadata, People Counting, traffic data statistics, etc.The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way. System OverviewPro AI series contains Face Capture, Perimeter Protection and People Counting functions. Powered by deep-learning Artificial Intelligence algorithms, significantly improved accuracy. Active Deterrence and Full Color camera are also in this series. Meanwhile, the series features starlight and smart IR technology. This series fully protected from dust and water, certified to IP67 standard. Functions Perimeter ProtectionDahua’s Perimeter Protection functions significantly improved accuracy. Perimeter Protection reduces false alarms and decreases pixel count requirements for object detection. Perimeter Protection features custom tripwires based on object type for automation in limited access areas such as pedestrian or vehicle-only zones. This combination of advanced AI analytics and real-time alerts to a desktop or to a mobile client reduces system requirements and resources resulting in greater surveillance system efficiency. People CountingPeople Counting function uses advanced image processing technology to capture depth information from within images. The camera pairs this information with deep learning algorithms to analyze and detect human bodies and track target objects in real time. The camera provides statistics for separate individuals’ entrance and exit with up to 95% counting accuracy. MetadataMetadata is feature attribute information extracted from a target object which can be used for data retrieval. Dahua face detection camera can extract six facial attributes and output the metadata for analysis. ePoE technologyThe ePoE technology of Dahua, designed internally, adopts advanced 2D-PAM3 coding modulation from physical layer, and realizes full duplex transmission over 800 meters at the speed of 10Mbps, or 300 meters at the speed of 100Mbps via Cat 5 or coaxial cable media. Besides, it supports PoE and PoC power supply technology which has greatly simplified construction and wiring. Dahua ePoE technology offer a new way to accomplish long distance transmission between IP camera and network switch. It allows more flexible surveillance system design, improves reliability and saves construction and wiring cost. Protection(IP67, wide voltage)The camera allows for ±30% input voltage tolerance, suitable for the most unstable conditions for outdoor applications. Its 6KV lightning rating provides effective protection for both the camera and its structure against lightning. Subjected and certified to rigorous dust and immersion tests (IP67) , the camera is the choice for installation in even the most unforgiving environments.
March Networks’ new ME3 Pendant IR PTZ camera delivers uncompromising security for large indoor and outdoor spaces, as well as essential features to ensure high reliability, clear image capture and storage efficiency. Ideal for large-footprint environments such as parking lots, big box stores and transit stations, the camera incorporates electronic image stabilisation and HDR, so recorded video is always crisp. Universal Power over Ethernet (UPoE) ensures redundancy and zero downtime by switching to PoE when a camera loses power. And built-in PTZ auto-tracking uses motion detection to automatically track a person or object, keeping the image centered and in focus. Software updates are quick and easy to apply using the mass management feature available in Command Enterprise software, while PTZ-optimized motion histograms speed search capabilities. The 3MP PTZ includes a 40x zoom lens to capture objects 25% further away than industry-standard PTZs, and IR LEDs for uniform illumination in total darkness at a distance of more than 650 feet/200 metres. It also incorporates a Low Bit Rate compression mode to improve bandwidth and storage efficiency by as much as 50% when the camera is in its home position. The ME3 Pendant IR PTZ is protected by a weather-proof enclosure, and generates an alert in the event someone attempts to obstruct or move the camera. It comes with a variety of mounting options, including a 1.5” NPT wall mount and short pendant mount, both with back boxes.
Browse Video Surveillance Storage System / HDD
Storage products updated recently
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The Rise In Knife Crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, while the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police Systems Benefiting Crime Investigations This is where facial recognition can offer up additional intelligence. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognize an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognize and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling Addiction And How Facial Recognition Can Help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilizing Facial Recognition At Airport Security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhile some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. While the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – while ignoring everyone else.
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognized that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact. It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on itBoth are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognized. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organization. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge differenceIndustry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organizations that might not care about cybersecurity but are prioritizing function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
Mobile Access- What You Need To Know (Part 1)Download
- Dahua Technology’s CCTV Solution Upgrades Security At Landmark Amman Hotel In Jordan
- Bosch Secures VTB Arena Park With Its Video Surveillance And Access Control Systems
- Bosch Equips Changchun Airport With Video Security, Intrusion Detection, Public Address And Access Control System
- Dahua Delivers Customized Monitoring Solution For Pengsheng Industrial Park In Uzbekistan