Toshiba Video Surveillance Storage System / HDD (3)
Browse Video Surveillance Storage System / HDD
Storage products updated recently
The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-Permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organization’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organizations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practiced in most modern office spaces, with it recognized as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organization leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behavior represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behavior represent a true security risk to organizations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. The Rise In Knife Crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, while the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police Systems Benefiting Crime Investigations This is where facial recognition can offer up additional intelligence. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognize an individual and see only data, not gender, age or race. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognize and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling Addiction And How Facial Recognition Can Help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilizing Facial Recognition At Airport Security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye While some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. While the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – while ignoring everyone else.
Attracting trade visitors from across the subcontinent, the region’s most influential trade fair for the security industry, Secutech India, is scheduled to return for its 9th edition from 7 – 9 May 2020 at the Bombay Exhibition Center, Mumbai. With exhibitor registration still open, the fair has already attracted more than 350 of the world’s leading security brands with less than three months remaining before it commences. The 2020 exhibition will feature Axis Communication, CP Plus, Hikvision, ZKTeco, Infinova, Matrix, Toshiba and many more. Security devices and turnkey solutions The 2020 edition of Secutech India is set to reflect the country’s digital transformation Detailing the business value of the fair, Ms Regina Tsai, the General Manager of Messe Frankfurt New Era Business Media Ltd said: “Catering to local market requirements such as cost efficiency and a need for fast project implementation, Secutech India assembles the full range of security devices and turnkey solutions under a single roof. Benefiting from its position in Mumbai, India’s commercial center, last year the fair attracted more than 20,000 buyers traveling from across India’s main regions, and we are looking forward to welcoming even more business this coming May.” The 2020 edition of Secutech India is set to reflect the country’s digital transformation. IP cameras are in high demand from SMEs, retail and the residential segment, while biometric access control systems are also gaining popularity in offices and at border controls, with users gradually favouring contactless systems such as facial recognition above fingerprint biometrics. Core security solutions In the view of Ms Tsai, this year’s fair is taking place at a favourable time for the regional industry: “The government aims to transform India into an electronics export hub, which will open up new opportunities for component manufacturers catering to the local manufacturing sector. But just as importantly, as part of India’s proposed Union Budget 2020, infrastructure development across roads, railroad, airports, ports, and economic corridors are expected to raise demand for core security solutions including video surveillance, video analytics, biometrics and intruder detection systems." "The governments ‘Digital India’, ‘Smart City Mission’, and ‘Technology Empowerment’ initiatives will also be growth drivers.” Access control in healthcare facilities As a maturing security market, the appetite for knowledge in India is growing" Among many benefits, the ability to make onsite comparisons, conduct meaningful business discussions and view product demonstrations are a few of the show elements that visitor’s to Secutech India value. According to Ms Tsai, business effectiveness is the top priority for the fair’s organisers: “Initiatives such as the ‘Secutech connect’ business matching service which links buyers with exhibitors based on industry background continue to be highly popular, helping us to generate genuine business outcomes for participants.” But beyond business, information exchange is also a priority says Ms Tsai: “As a maturing security market, the appetite for knowledge in India is growing. This is a need that the upcoming edition of Secutech India will cater for with a series of conferences dealing with topics relevant to the local market, including cybersecurity, smart city digital infrastructure; the convergence of 5G, artificial intelligence, data analytics and the IoT; access control in healthcare facilities, and fire safety in elderly care homes and restaurants.” Personal protection equipment In addition to its core focus on security, Secutech India 2020, in cooperation with the GPS Association of India, will feature a pavilion dedicated to fleet management, vehicle tracking as well as passenger and driver safety. The concurrent ‘Fire and Safety India’ event will also return as the destination for trade buyers to locate the latest firefighting gear, personal protection equipment and smoke detection systems.
XProtect® Smart Client In A 'Smart City' When the City of Beverly Hills began searching for a way to enhance and expand its video surveillance program, officials turned to Milestone Systems' XProtect IP video platform. Former mayor and technology CEO Jimmy Delshad wanted an IP video surveillance system that would reflect Beverly Hills' progressive 'Smart City' initiative. He saw IP video as a means to help the city achieve its goal of being the smartest, safest and most sustainable city in the country. Beverly Hills has a centralized IT Department headed up by Chief Information Officer David Schirmer and Assistant CIO Mark Hobson. The city has integrated Milestone XProtect with several municipal functions, including Fire, Police, Parks and Recreation and Public Works departments. "The software has been great because we can manage it centrally and view it remotely," says Hobson. "This has helped all city operations become more efficient." The Open Platform For Future Scalability According to Schirmer, the city's challenge was to incorporate a system that was reliable,flexible and scalable. "We wanted the best of the class – an all IP-based surveillance system that would support the best cameras on the market with the best image quality," he explained. Milestone XProtect® Enterprise is currently supporting high-end megapixel cameras from IQinVision, Axis, Toshiba and a series of legacy analog cameras, as well. Beverly Hills has a population of about 35,000 residents, but on any given day "we host around 300,000 visitors and workers," notes Hobson. This comes as no surprise for the most famous zip code in the country, where reliable surveillance is a must at such famous landmarks as Santa Monica Boulevard and Rodeo Drive. It is also no secret that Beverly Hills is home to several high-profile residents, from celebrities and foreign diplomats to very successful business executives. Along with such notable residents come nationally anticipated events, such as the Golden Globes™ award ceremony, which draws even more visitors to Beverly Hills. As of June the city had 45 cameras installed, aiming for 100 before the end of 2008. The California Retention Law requires that archived footage be stored for a minimum of 12 months. To aid in archiving and storage – the third phase of the Milestone project – the city is working with Milestone integration partner, Mainline Information Systems. Hardware Used: A Camera Mix For Best-In-Class "There have been zero problems with the Milestone XProtect software, so it is easy to earn ongoing support from city council and to secure grants from the Department of Justice (Homeland Security), which aids in the future growth of the system" IBM video record and archive components: X series servers using dual core Xeon processors Fiber Channel expandable storage using X and N series components Tivoli Tape System Management for long term retention requirements Cameras (to date): IQinVision 500, 700, and 800 series New IQinVision Sentinel Axis 233D PTZ and 216FD fixed dome Currently on order: Arecont 360 and 180 dome cameras Video-Enabling The City After working with Milestone, the city realised that it could use Milestone XProtect to monitor the progress of building projects and to ensure safety. "The city is in the process of constructing a vehicle storage building," explains Schirmer, "and we're using Milestone to monitor the progress and to make sure the construction crew is wearing hard hats." The Fire Department also saw the benefits of the system and requested a camera to be placed on top of one of the Beverly Hills towers, the better to see and manage a situation by remotely accessing the footage. What's Next? The City of Beverly Hills will soon embark on the next phase of the installation plan. Currently, officials are working on the back end, archiving features, but they plan to add up to 80 more cameras in the third phase alone. Hobson explains that he is hoping to see more than 250 cameras installed when the project is complete. The city is also planning to integrate the Milestone XProtect Enterprise software into the Beverly Hills school system and businesses throughout the community. The Department of Homeland Security has recognized the city's critical infrastructure as a part of the Urban Area Security Initiative (UASI) and officials there are interested in using Beverly Hills as a prototype for larger cities, according to Schirmer. The city's ideas of expanding coverage with additional cameras and integrating schools, hotels and businesses with the system are in line with the Milestone standard of leveraging existing systems to provide unsurpassed security every day and for special events, such as the Golden Globes. The City of Beverly Hills already has existing technology in its police squad cars, and is looking to incorporate the Milestone system, with a goal of having total security running over one network throughout the City. "Milestone was chosen for its integration, flexibility, pricing structure and ease of use" The Advantages Of IP Video Open Platform Beverly Hills wanted a system with adequate out-of-the-box features that offered the latest advances, such as analytics. "We wanted a reliable system that was flexible enough to integrate other features and have a low overhead in the future," explains Schirmer. "Milestone provided that, and since it integrated so seamlessly to our system, we did not have to hire a new person to implement it." The most important aspect, he adds, is that "there have been zero problems with the Milestone XProtect software, so it is easy to earn ongoing support from city council and to secure grants from the Department of Justice (Homeland Security), which aids in the future growth of the system." Milestone XProtect software users also know that in addition to this reliability, the Power-over-Ethernet that an IP solution brings drastically cuts down on labor and costly cabling. Strong Partners Win Together With Milestone as a partner, gaining clients comes about naturally. Mainline is a Milestone-certified integration partner that has been able to interact directly with the Beverly Hills technical staff. Timothy Conwell of Mainline Information Systems says Milestone XProtect was selected for the Beverly Hills project following a thorough review by the city and by the Mainline consulting team. The research included industry tradeshows and recommendations from camera product partners that Mainline works with directly. "Milestone was chosen for its integration, flexibility, pricing structure and ease of use," Conwell says. "We're working with very advanced technology integration strategies, which include enterprise-level archive storage management by IBM, high-speed fixed broadband wireless, and MAN deployment techniques." Schirmer of Beverly Hills says the partnership has been productive: "Tim Conwell and the Mainline team have been instrumental in understanding the storage and our need to be able to rapidly search for archived footage." Among the chief qualities of the Milestone XProtect system, as it is being used in Beverly Hills, Conwell cited these outstanding features: Flexibility Of Scaling: The system has grown from a "proof of concept" design with a single server and a few cameras, to what will eventually include hundreds of cameras placed over the entire six square-mile area of Beverly Hills. The ability to scale to a multi-server distributed design and bring additional feature functions online over time is extremely helpful. A good example is the implementation of the Matrix service for the Police and Public Works departments. The system also has the ability to mix and match camera technology for the location and environment each camera covers. Pricing Structure: Milestone's pricing is competitive and cost-effective. With the unlimited server and unlimited user access per site license business model, the overall software cost of the system integration is actually lower as the system grows. Ease Of Use: Officials in Beverly Hills have been very pleased with the feature-rich user interface and the ability to quickly learn the system. Mainline implemented a successful "train the trainer" approach with the help of its MIS division throughout the project process.
Equipment installed includes a grouping of fixed cameras in American Dynamics housing and PTZ equipment Stonestreet Farm Stonestreet is a horseman’s paradise. The property is one of three horse farms owned by vintner Jess Jackson, founder of Kendall- Jackson Winery, and is a world-class facility for raising and training champion thorough-bred horses. Also, it’s where his broodmares foal, so this pristine farm is a nursery, of sorts, for horses. When Jackson and Jay Foote, his security manager, were discussing the farm’s vulnerabilities, they turned to Roy Abney of Secure Concepts Integration in Lexington. Together they worked on designing a system that met their needs and goals. SCI was then challenged to implement the solution within the 32 remaining days until the 2006 Kentucky Derby. The Royal Treatment Foote said the system was integrated by selecting the most compatible components from a variety of manufacturers. The objective was to deliver maximum performance given the high profile of its owner and his guests, which have included oil magnates, heads of state and other high-profile guests. “When we examined possible equipment, I picked items I like,” Foote said. “Then the integrator suggested certain applications, and we met halfway. The best part of working with SCI is they showed us how to get the most use from the equipment we were installing.” A high-profile installation covering a large area that uses both wired and wireless technology cost Stonestreet Farms about a quarter of a million dollars. While the investment is significant, it is so diverse in capability that multiple departments within the farm operations use its features. Security officers were trained to fully understand the ins and outs of the new system, including how to use the cameras to their full potential and maximum efficiency. Officers have access to wireless panic buttons and roving vehicles now equipped with the capability of 24-hour surveillance. Human resources also use the system to inform officers as to when workers arrive for daily duties. From a personnel standpoint, security management also can keep track of who is at work and where they are. Candid Camera Cameras and intercoms are used to enhance the farm’s access control system by allowing security officers to view and communicate with whoever is approaching any of the automated security gates. The cameras are the mainstay of the operation, and they come in many varieties. Equipment installed includes a grouping of fixed cameras in American Dynamics housing and PTZ equipment. SCI installed a parallel Ethernet network strictly for the access control and video surveillance system. "When the camera is approaching the house, we zoom in on the license plate and grab a clear image of it" SCI placed up to five Toshiba IK- 6200A cameras in each of the barns. These same cameras are installed at the main entrance to provide security for those people permitted on that part of the farm. The cameras are attached to Axis 241Q network video servers where streaming video is sent wirelessly over the Alvarion Ethernet cloud covering the entire farm. The Toshiba cameras were selected because of price and performance ratios. At the time of installation, the cameras represented a good value for a color CCD camera with day/night capabilities. According to SCI systems integrator Stephen Bond, there were considerable savings to be gained by using analog cameras attached to an Axis video server that used all four of its ports. SCI selected the Sony SNC-CS3N IPELA network camera for those areas where only one or two cameras were needed. This camera streams video directly across the Alvarion wireless network. One advantage of using IP cameras is that the end user can adjust brightness, color and contrast from the camera’s Web interface. This is far superior to dragging a ladder around the farm, fine tuning cameras for optimum performance. These cameras are installed at all entrance gates, the main office and at the guard shack, where one is used as a license plate reader. Cameras also are used as access control devices so security officials know when a gate opens, allowing them to zoom in on prefixed points. These cameras are installed at the main office, used as a license plate reader and placed at the guard shack. Integrators selected the Sony SNC CS11 IPELA cameras because they stream video directly into the Alvarion wireless Ethernet cloud and were cost effective for the application. Taking this concept a bit further, a Sony SNC-RZ25N network PTZ camera was installed near the island bridge leading up to the main residence. Multiple vehicle sensors are tied into the camera, so the camera tracks vehicles as they move up the driveway. “When the camera is approaching the house, we zoom in on the license plate and grab a clear image of it,” Bond said. “There is a slight bump as you roll onto the stone bridge, which everyone breaks for. The bridge acts as a natural speed bump, causing everyone to tap their brakes and slow down. This allows for nearly perfect license plate shots every time.” “When other farm managers come to view our operations, it’s been fun showing off our security system that works in conjunction with our daily activities" Bond also said the camera is in a preset tour mode when no vehicles are in the area, and the roving security detail has full control of the camera’s PTZ capabilities anytime they want to look around. This can be accomplished from the security vehicle, the guard shack or the main security office. A Sense of Pride Although the installation was completed more than a year ago, Bond said the system is clearly still state-of-the- art. The camera system also has other uses. For example, the camera system is used for training the security force by allowing them to review their performance after staged incidences. In the event something should happen, all video is recorded and archieved for at least 30 days on multiple American Dynamics INTELLEX IP NVRs. Even on a farm where thoroughbreds are the prized possession, this security system has had its share of the limelight. “When other farm managers come to view our operations, it’s been fun showing off our security system that works in conjunction with our daily activities,” Foote said. “I’m very proud of what we’ve done here.” While Phase I was completed by the 2006 Kentucky Derby, other features have been added to the security system, including integration with a Kantech access control system and an audible messaging system forthe roving security vehicles. In 2010, the FEI Alltech World Equestrian Games will be held in Lexington, making it the first time this Olympics for horses will be held outside Europe. Horse farm managers are looking at Stonestreet Farms as they begin preparations for this major event that will require substantial security upgrades at their facilities, as well. After all, if the security system in place is good enough for royalty, surely it must be fitting for some of the finest thoroughbred race horses in the world.
Related white papers
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention Needs
Five Things To Consider For AI With Video Technology
Making Your Surveillance Cyber Secure
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
- Ava Security Highlights Ways To Protect Commercial Properties And Safeguard People
- Ava Security Provides Improved Security And Customer Experience With Advanced Analytics For The Retail Sector
- HPE Enhances Data Storage Solution For The Irish Prison Service Along With Scality And CTERA
- IDIS Video Surveillance Solutions Strengthens The Video Infrastructure Of Newman University