Digital Video Recorders
Matrox Graphics Inc. is pleased to announce a series of major updates to its award-winning Matrox Maevex 6100 Series of multi-channel 4K enterprise encoders. Supporting all of today’s most widely-used streaming protocols, the Maevex 6100 Series enterprise encoder appliances and cards now include built-in HLS support that allows enterprises to deliver multiple, dynamically-optimized streams to a broad range of devices over the internet. Maevex 6100 encoders now also support IPv6 addressing...
ONVIF, a global standardization initiative for IP-based physical security products, announced that its Export File Format, the ONVIF specification for the export of video from security surveillance recording platforms, is the new standard recommended by the National Institute of Standards and Technology (NIST) for the exporting and playback of video surveillance recordings. In a research project commissioned by the FBI to aid law enforcement in forensic investigations, NIST worked in conjunctio...
Eagle Eye Networks, globally renowned cloud video surveillance solutions company, has announced the introduction of an open, public domain, secure, plug and play communications framework that enables video manufacturers to connect cameras, DVRs and encoders to the cloud. Eagle Eye Networks’ Cloud Camera Specification has been developed with 10 years’ experience gained from practical integrations with camera manufacturers and cloud technology partnerships. Eagle Eye is providing an op...
3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European mar...
At InfoComm 2019 (booth 3055), Matrox will be showcasing its complete range of award-winning, IP-based products including quad 4K enterprise encoders, remote recorder appliances, 4K capture/encode/decode and multiviewer cards, 4K IP KVM extenders, lecture capture appliances, and 4K/multi-HD webcasting encoders. Be amongst the first to discover new products and features from Matrox. Matrox will be launching a major addition to its world-class portfolio, unveiling a revolutionary new line of vide...
The inaugural Tech Security Summit met at the Sheraton Grand Nashville last week. Combining DICE Corporation’s annual DICE User Group Conference with a series of educational sessions and panel discussions, the April 29-May 2 event provided a platform for leaders in security and alarm monitoring to meet and examine new technology and revenue growth opportunities in an evolving industry. DICE Corporation President and CEO Cliff Dice kicked off day one with an energizing keynote presentation...
TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level. This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having ‘a coach in their back pocket.’ From scheduling and interacting with security staff to incident reporting, TrackTik’s software offers a complete suite of tools, including real-time checkpoint logging, incident reporting, GPS tracking, messaging, alerts and audio-video capabilities. Real-Time Picture With a variety of checkpoint options, together with GPS tracking, TrackTik’s automated guard tour system creates a real-time picture of an organization’s guard tour operations that improves transparency and accountability. The guard tour system establishes permitted and restricted zones, and can assign special protocols for specific locations. Offering immediate communication, modifications and transmission of data, TrackTik’s automated guard tour system also provides a live picture of the security environment in which security personnel are operating. The watch mode audio and video feed and recording feature informs of dangerous situations, which also helps support the health and safety of security personnel dealing with potentially high-risk situations, resulting in maximized security impact to help deliver a safer environment.
Larson Electronics, a Texas-based company with over 40 years of experience spearheading the industrial lighting and equipment sectors, announced the release of an explosion-proof network IP camera with built-in infrared light. This remote inspection camera is designed for use in hazardous locations and is explosion, dust and ignition proof, weatherproof and tamper resistant. This camera provides the operator with a live feed from inside tanks, reactors, vessels or other locations. Clear Images In Low-Light Conditions The camera offers a wide-angle fixed lens with an 83-degree field of view and is made to cover large areas and workspacesThe EXPCMR-IP-POEP-4MP-IR-1XLE3 explosion-proof network IP camera features a built-in 1/3-inch progressive-scan CMOS image sensor that delivers up to 4.0MP resolution at 20 FPS. This unit offers a wide-angle fixed lens with an 83-degree field of view and is made to cover large areas and workspaces. This 17-watt camera provides a crisp and clear image and captures images in low-light conditions. An NVR is necessary for stream recording, or live-view can be done without an NVR system via report access to the camera. Larson Electronics’ explosion-proof camera is available in spot and floodlight configurations and features four Edison Edixeon three-watt LEDs, producing 180 lumens, arranged in rows and paired with high purity 10-degree optics to produce a narrow spot beam. This unit is compatible with PoE+ devices and links up to a customer provided DVR system via a customer provided RJ45 Ethernet cable. The device is suitable for use in the remote observation of external facilities, monitoring of cleaning and more.
Edesix, UK-based provider of Body Worn Cameras, will be joined by Vigilant Solutions to showcase its new Automated Number Plate Recognition (ANPR) technology at Parkex 2019, in addition to Edesix's renowned Wearable Camera solutions. Also part of the Motorola Solutions group, Vigilant Solutions has been supplying automated number plate recognition cameras and software to law enforcement for more than 10 years to locate vehicles of interest and solve crimes faster. These cameras and software are now available to parking agencies—providing a cost-effective enforcement solution. Assist Parking Agencies ANPR technology can assist parking agencies in discovering vehicles in violation, to collect outstanding fines, more efficiently enforce paid and permit parking spots, or take other appropriate actions. Vigilant Solutions ANPR expert from the US Alex Tallentire, will be at the Edesix stand to demonstrate the latest technology in this field. Edesix Body Worn Cameras, such as the VideoBadge VB-300 series, have been deployed by UK-based parking agencies for a number of years now Edesix Body Worn Cameras, such as the VideoBadge VB-300 series, have been deployed by UK-based parking agencies for a number of years now. Front line parking staff such as civil enforcement officers (CEOs) are often subjected to verbal and even physical abuse, so ensuring these patrol officers remain safe has been a priority of councils and their contractors. Validate Parking Fines The use of Body Worn Cameras is a proven way to deter aggression whilst capturing evidence which can be used in court. BWC's can also be utilised to validate parking fines and quash complaints or false claims. Richie McBride, managing director of Edesix, explains: “The use of Body Worn Cameras is a proven way of tackling the growing problem of abusive behavior in the parking sector. BWC's reduce the number of false allegations against enforcement officers and instances of aggression and violence, helping those doing a difficult job feel safer and more protected, particularly when working alone. Should an assault occur, the video and audio recording can provide evidence of abuse and attacks that can be used to prosecute offenders. Footage can also prove or disprove allegations made about misconduct by patrol officers.”
Eagle Eye Networks, the provider of cloud video surveillance worldwide, announces the Eagle Eye Mobile Camera MC01 which is available immediately via its reseller partners. The MC01 is a small 4G/LTE camera for use in locations that have difficulty with standard internet access. Eagle Eye Networks is also making mobile data plans available so that channel partners can provide a complete solution to their customers. The Eagle Eye MC01 is designed specifically for remote applications, temporary installations, or changing environments where standard Internet connectivity is not easily available. The MC01 is ideal for temporary installations. The MC01 provides direct camera to cloud connectivity, plug and play installation, advanced person detection analytics and state-of-the-art cyber security. Cloud Managed Solution The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps. “The Eagle Eye Mobile Camera MC01 is another step on the path of bringing all the security camera video that customers have and need, into a single secure cloud managed solution” said Dean Drako, CEO of Eagle Eye Networks. The Eagle Eye Mobile Camera MC01 will be fully integrated into the Eagle Eye Cloud VMS platform later this year, until then the new camera operates on a stand alone cloud recording system. The Eagle Eye Mobile Camera MC01 has the following specifications: Indoor and Outdoor capabilities, 2.43 MegaPixel Resolution, 3G/4G and Wifi connectivity, 2.8 mm Lens, Wide Angle View (138º), Night Vision IR Led with 10m range, Waterproof, Two Way Audio. Home Care Applications The Eagle Eye Mobile Camera MC01 has been utilised in many applications including: Remote industrial sites Remote storage facilities Crop monitoring Temporary construction Garages Building stairwells Festivals Oil and gas pumping stations Remote water cleaning facilities Ship locks Health and home care applications Comprehensive Data Plans The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wifi and 4G combined The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wifi and 4G combined. When combined, the 4G is used as a back-up to the Wifi connectivity. The Eagle Eye MC01 can function with a customer’s mobile data plan or with a data plan available from Eagle Eye Networks. The Eagle Eye MC01 is a simple to install plug and play camera derived from the successful consumer focused NuboCam. NuboCam, launched in 2015 was the world’s first 4G / LTE camera and remains available to consumer customers on the NuboCam website. The new commercial Eagle Eye Mobile Camera MC01, however, has additional capabilities, robustness, integrations, more flexible recording plans, and more comprehensive data plans. It has been upgraded and designed to meet the needs of commercial customers.
Dahua Technology, global video surveillance solutions provider, is celebrating its fifth year of local operation in the North American market. Established in Irvine in 2014, the North America office has grown from one employee — President and CEO of Dahua Technology USA, Tim Wang — to more than 100 employees in the span of five years. Today, the Dahua Technology USA team includes sales representatives and technical consultants spread throughout every region of the United States and Canada. The company attributes its success, in part, to its commitment to empowering its customers. As such, “Empowering through Technology” is Dahua Technology’s theme at this year’s ISC West show, April 10-12, in Las Vegas. “Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users,” Tim Shen, Director of Marketing at Dahua Technology USA, explained. “In addition, the resources we make available to our dealers ensure that they are up-to-speed on their knowledge of our technology and fully trained on the products.” Learn Dahua Online Training Platform These resources include Learn Dahua, an online platform available to Dahua Technology USA’s registered dealer partners, which offers video tutorials and courses on Dahua technology. Dealer partners also benefit from monthly webinars. The DahuaWiki is an extensive public resource that includes side-by-side product comparisons, manuals, how-tos, live camera demos, software, and firmware. It has received seven million hits since its launch, and currently averages approximately 16,000 hits a day. Dahua Technology was the first company to introduce penta-brid technology in its digital video recorders Dahua Technology’s advanced technology is the fruit of more than 50% of the research and development engineers at company headquarters. Dahua Technology is known for its proprietary video compression codec, Smart H.265+, as well as its cutting-edge Starlight technology. Multi-Flex Panoramic Cameras Dahua Technology was the first company to introduce penta-brid technology in its digital video recorders, allowing the five most common transmission formats to integrate into one system. The latest offerings include the new Multi-Flex panoramic camera, Night Color technology for detailed, full-color images in near-complete darkness, and Extended Power over Ethernet (ePoE) technology, which is compatible with both coaxial and IP cabling. All of these products and more will be on display at booth 14039 at ISC West. “Dahua Technology’s forward-thinking approach keeps us at the leading edge of video surveillance technology, which in turn allows our dealers to sell and install our products with confidence,” said Wayne Hurd, VP of Sales at Dahua Technology USA. “Our technology is constantly evolving to meet current and future needs, giving dealers and end-users peace of mind that they’ve selected the most advanced security solution on the market.”
Larson Electronics, a Texas-based company with over 40 years of experience in spearheading the industrial lighting and equipment sectors, has announced the release of an explosion proof 1080p analog submersible camera for underwater monitoring in freshwater environments. This unit can be submerged up to 50 feet and is available in a fixed lens configuration and has a 3.6mm 90-degree lens for wide-area viewing. Explosion-Proof Analog Cameras The EXPCMR-SWP.FW-ALG-1080P-IC-1227-12.7-100C explosion proof 1080p analog camera provides operators with a live feed of underwater environments in freshwater hazardous locations. This unit can operate remotely from a centralized control room and features an infrared LED array for lowlight and nighttime visibility. The camera automatically switches over to IR mode when lux levels drop below present level and a true Day/Night infrared cut-off filter removal creates a sharp image transmitting with zero latency to HD resolution through a metal clad coax cable to customer-provided DVR systems. Underwater Monitoring And Surveillance Larson Electronics’ explosion proof camera features a pressure-resistant 316 stainless-steel body and features 1 lux sensitivity and a 2-wire transmitter with a stainless-steel mounting bracket. This unit also features a built-in color CCD camera and a 1/3” CCD sensor. The lens features a 28-degree to 60-degree viewing angle with a minimum lens-to-object distance of 3.15” and is rated for use in Class I, Divisions 1 and 2, Groups B, C and D; Class I, Zones 1 and 2, Groups IIB+H2 and IIA, Class II, Divisions 1 and 2, Groups E, F and G; and Class II, Divisions 1 and 2. This unit comes with 100 feet of 12/5 SOOW pre-wired cord and Kellum cord grip to provide power and video signal to the camera. This unit can be mounted to flat surfaces via the provided flat surface brackets. This unit is suitable for use in underwater operations in fresh water, underwater monitoring, remote observation of external facilities, and more.
According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analog, many end users looking for high definition (HD) video quality have been forced to take on a complete system overhaul. Infrastructure Overhaul For HD Video To make the switch, customers would need to change everything, from cameras to hardware to wiring– not to mention the lengthy installation process that would ensue. IP cameras also require higher Internet speeds and more cloud space. Whether constrained by budget, bandwidth or storage, many end users have been unable to adopt this new video surveillance method.Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike. By utilising the current Coaxial cables, this offering yields high definition video, while requiring minimal infrastructure changes and is an optimal surveillance choice for security customers. Plus, with new advancements and updates being made frequently to this technology, there is a solution for every security need. The enhanced alternative of HD over Coax has been warmly welcomed in the security industry, thanks to its simple solutions and ever-evolving features. Many new analog HD cameras are “plug and play,” able to connect directly to existing Coaxial cables. This eliminates the need for a complete system change, creating cost-savings for the end user and an enhanced video quality offering. Easy Solutions For HD Video As a result, integrators can cost-effectively upgrade their customer’s surveillance solution while using their legacy infrastructure, making it an attractive option for end users and an easy sell for dealers. Latency in video is another common issue with network-based camera systems, where even the slightest delay in video surveillance can hinder security response HD over Coax cameras themselves are always expanding and evolving to meet a wide array of security needs. With the introduction of fisheye and multi-sensor cameras, users now have a multitude of coverage options, not to mention the introduction of 4K bringing resolution options to the same level as IP. Some newer technologies are even touting 4K cameras paired with 4K digital video recorders (DVRs) made specifically for analog systems. Longer cables grant transmission for up to 1600 feet, double the distance of standard analog solutions, and triple that of IP systems. This single cable is able to transmit both HD video and audio. Recently, broadcast quality audio over Coax has become available in limited models, a substantial improvement over older analog technology, which was unable to transmit audio. Stopping Video Delay Latency in video is another common issue with network-based camera systems. Even the slightest delay in video surveillance can hinder security response. IP cameras are forced to compress and packetize their video for transmission. The outcome of this is a reduced number of images per video, which in turn causes delay. HD over Coax on the other hand, delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity. Additionally, the point-to-point transmission delivers uncompressed video free of lag. Another touted benefit is that, unlike IP networked cameras, analog systems provide a more secure video transmission. With so much sensitive information housed on a businesses’ network, adding another point of network access through an IP camera can create concerns for cyber security risks. HD over Coax delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity Preventing Network Hacking With HD over Coax, the physical connections between the camera and DVR prevent network hacking. By keeping the video surveillance system offline, security professionals are able to direct their attention to the physical threats at hand, rather than having to focus on deterring cyber security risks. One of the primary difficulties of deploying HD video solutions is the fact that many older systems utilize a wide variety of HD standards and platforms. To make matters more complicated, after HD over Coax was brought to market, manufacturers raced to create their own version of this technology. Today, the most popular proprietary standards are HD-CVI, HD-TVI and AHD. However, integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible.Integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible Diversifying Surveillance Through One DVR To combat these issues, manufacturers have introduced products with more flexibility to their portfolios. One example of this is the penta-brid DVR which grants the ability to seamlessly integrate multiple technologies deployed across one application. This means that systems with diverse camera brands and technologies, such as a mix of HD-CVI, HD-TVI, AHD, analog or IP, can be connected through one DVR. For many end users with legacy analog systems, penta-brid DVRs give them greater freedom to choose between a variety of solutions, rather than being limited to one option. With video resolution increasing, the space needed to store the footage is similarly rising. Penta-brid technology has been able to adapt to these evolving needs, giving users ample storage space to house the HD and 4K surveillance video with some of the newest models including H.265 compression. HD Casino Surveillance Made Simple For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff While HD over Coax is beneficial to many end users and integrators, those in the casino and hospitality markets find it crucial. With a combination of high profile guests, large amounts of cash on hand, constant crowds and strict industry regulations, reliable video surveillance is a must. Deploying new IP systems comes at a stiff price. When looking to upgrade their video surveillance, casinos must also be mindful of the installation process. When moving to an IP-based system, ripping out old wires and replacing them with new is the standard practice. This practice can be both disruptive and costly, not to mention gaming regulations require casino activities be monitored at all times so a complete system shutdown would result in revenue loss. This cost can be hard to justify, especially when the current legacy analog system remains in working condition with only the lower image resolution to date it. For these scenarios, the most cost-effective option is to leverage the legacy infrastructure, replace the existing cameras with new devices, and reap the benefits that HD video has to offer without any lapse in security. For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff. HD over Coax cameras now offer the same resolution as IP cameras with a plug and play approach, that cuts down on expense without sacrificing quality. For businesses and applications that are unable to adopt IP technology, whether it be cost or time prohibitive, HD over Coax now features most of the same benefits IP has to offer without breaking the bank. By providing clear images in real time, maximizing existing infrastructure, and affording cyber security benefits, HD over Coax provides an attractive solution for many end users and integrators.
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organizations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting Educational Facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organizations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organization, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active Shooter Incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralize video management, viewing and analysis. Upgrading From Analog Systems Altogether, its security system consisted of older analog platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralize system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimized for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximizes performance and storage capacity utilization. The platform also hosts the university’s video management solution, which serves as a centralized source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting Air Travel And Airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernize and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage System Updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing Expenses And Costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialized IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organizations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.
There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keeping intruders out of our buildings but now—off our networks. It should come as no surprise that cybercrime is one of the biggest threats organizationisations of all shapes and sizes face today. While attacks on major brands and Fortune 500 companies make headlines, there were purportedly 918 reported data breaches, compromising nearly 2 billion data records in just the first six months of 2017. Of those 918 breaches, 500 of them had an unknown number of compromised records. Some in the industry referred to not locating cyberattacks in a swift manner as a breach detection gap or dwell time Reducing Breach Detection Gap Depending on your organization, these cybercrimes and the investigation into them, may be handled by your IT department. However, considering the magnitude of these crimes, it now falls on the entire organization, including the traditional security or loss prevention executives, to band together to combat these threats. One of the biggest challenges cyberattacks pose is timing. Often cyberattacks can go undetected for weeks, months or even years. Some in the industry referred to this timing as a breach detection gap or dwell time and is defined as the time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim. To put that into perspective, the most recent Ponemon report on the cost of a data breach showed dwell time for malicious attacks has stretched to an average of 229 days—a long time for bad actors to be lurking around your networks. Many companies rely on heritage-based services offered by managed security service providers (MSSPs) Traditional Cybersecurity Measures We are familiar with traditional cyber lines of defence against these attacks like firewalls and anti-virus software. While these solutions are effective at identifying and potentially stopping known forms of malware and viruses that are attacking companies every day, they are blind to signatureless and zero-day malicious activity. Unfortunately, this trend does not show signs of letting up as internal security processes are having trouble keeping up with increasingly sophisticated land pervasive threats. Many companies rely on heritage-based services offered by managed security service providers (MSSPs) that use security information and event management (SIEM) software, or intrusion detection systems/intrusion prevention systems (IDS or IPS respectively) to monitor networks for malicious activities on a continuous basis. However, these activities are based on known threats where a valid signature of the cyberattack or system logs are available and used to analyze activity. They then provide security alerts to the client and generate reports for compliance purposes. This form of alerting often generates an overwhelming number of notifications causing what is coined in the industry as ‘alert fatigue’ making it hard to weed out what is important from what is not. Managed detection response uses a combination of advanced technology and expert human analysis to combat cybercrime Managed Detection And Response The Ponemon Institute found that companies spend an average of 21,000 hours each year analyzing false negative/false positive alerts trying to detect and contain cyberattacks. This translates to approximately 17,000 security alerts in a week of which only 4% were deemed reliable and investigated. This can potentially waste nearly $1.3 million per year on investigating and managing inaccurate data. Based on this overwhelming challenge, it’s time for organizations to look at improving real-time threat detection and incident response capabilities beyond standard security screening and compliance requirements. In addition to the services provided by an MSSP, it would be wise to add or layer a managed detection and response (MDR) service to your arsenal of cyber defence weapons. An MDR analyst can replay the event allowing him to dig deeper into the incident and determine remediation steps Identifying Real Threats With MDR Services MDR services use a unique combination of advanced technology and expert human analysis. Equating MDR services to traditional physical security devices, it is more like having a DVR, where an analyst can go back and replay the incident on the network via packet capture technology. Event logs and signatures by themselves don’t provide visibility and detail. Traditional cyber defences act like a conventional alarm system. The alarm sounds and a notification is sent, but there is no context or detail about the incident and it is up to the recipient to determine if the alarm is valid, what exactly happened and what to do about it. With packet capture on the network, an MDR analyst can replay the event allowing him to dig deeper into the incident and determine remediation steps. This approach helps quickly identify real threats to the business, provides remediation specifics for timely resolution, and significantly cuts through the false positive noise so security teams can focus on the things that matter. Efficient Incident Management MDR services only notify clients after the incident is verified. The notifications provide granular detail of the scope and severity of an attack with recommendations for quick containment and response. MDR services offer 24/7/365 continuous monitoring of customer network data, provide analysis of the data to add context to the event and notify the customer of the incident. With MDR services, clients have direct communication with the security analyst and rely less on using an alert portal With MDR services, clients have direct communication with the security analyst and rely less on using a portal for alerting, investigations, case management and workflow activities. Because MDR services rely on advanced tools and human analysis, they are more apt to uncover malicious activity that has breached the first line of defence and can reduce the time from infection to detection to minutes rather than months. Combating Cybercrime With Secure Networks To sum it all up, MSSPs focus on perimeter devices like firewalls, or IDS/IPS and SIEM and provide device management such as updating firewall rules, anti-virus software and compliance reporting. They are typically used to supplement internal IT or security teams. An MDR service concentrates on detecting threats that have penetrated the perimeter. MDRs deliver threat notification and remediation guidance. While both solutions provide value to their clients, their basic areas of focus are different. Cybercriminals are becoming more coordinated in their efforts to steal our data, disrupt our operations and damage our brands. It is time that we coordinate our efforts across the entire organization to combat them.
Virtualization offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged Infrastructure Solution “ISC West attendees were able to get their hands on our hyperconverged solution and immediately see how easy it is to use and the benefit of adding virtual machines,” says BCDVideo’s Chief Technology Officer Tom Larson. Security integrators were impressed that BCDVideo continues to adapt technologies" Virtualization was just one of the innovations in BCDVideo’s demo room. Many integrators and end users found their way to the conference room, located not far from the exhibition hall, and BCDVideo was also featured at partners’ booths on the show floor. “Security integrators were impressed that BCDVideo continues to adapt technologies to the video surveillance space,” says Larson. “BCDVideo ‘gets’ them, but often IT does not. The HCI solution is purpose-built for video, and it works.” Server, Storage And Networking BCDVideo’s HCI-VS is a virtualized, video-optimized and highly available infrastructure. It combines the server, storage and networking into one platform. Powered by Scale Computing’s HC3 software, BCDVideo’s HCI is a scalable, node/cluster-based infrastructure that enables integrators to virtualize their physical security appliances and software, meaning fewer devices need to be deployed and maintained. Physical security integrators can create an infrastructure that provides high availability to the VMS" “More importantly, our HCI makes it easier than ever before both to quickly create and deploy virtual machines, and to manage video surveillance infrastructure,” says Larson. Some of the unique needs that HCI-VS serves are those of multi-faceted projects involving video recording, access control, building management, etc. With HCI-VS, separate appliances are not needed for each of these tasks, which enables better use of hardware, reduces overall rack space and power/cooling costs. Essentially, this solution eliminates the “pizza box” model and serves the need in the marketplace where always-on video and high availability are necessary, and especially in situations where loss of video data cannot be tolerated, says Larson. Simplified graphical user interface (GUI) makes it easy for integrators to implement systems that use hyperconverged technology Tolerant To Hardware Failure “By leveraging the concepts of hyperconvergence, physical security integrators can create an infrastructure that provides high availability to the video management system,” he says. “When components within a video management system are tolerant to hardware failure, it results in less loss of data and continual access to the data from the failed component. You always have access to the video data even if the hard drive fails.” Defining Virtualization Virtualization is the act of creating virtual copies of physical resources, including, but not limited to, compute, memory, storage, and network resources. This is achieved by employing software to manage all physical resources, known as a hypervisor. As servers become more powerful, the discrepancy between software and hardware capabilities result in inefficient use of resources. “By partitioning the hardware resources into smaller virtual environments, we can create multiple virtualized servers that share a common set of resources,” says Larson. “By sharing this common set of resources, the virtualized servers utilize the resources more efficiently with less waste.” Integrators and end users flocked to BCDVideo's demo room at ISC West to try out the new hyperconverged solution Education And Physical Security Learning about the benefits of why to virtualize and applications will be a first step” A challenge to greater adoption of virtualization in the physical security industry is education. “Some security integrators will need to step out of their comfort zone,” says Larson. “Virtualization for video has been slow to adapt, and other solutions are complicated. IT technology applications traditionally have not worked in the space either. Learning about the benefits of why to virtualize and applications will be a first step.” HCI-VS In New Verticals While HCI-VS is vertical-market-agnostic, the solution is suitable for school districts looking to consolidate their hardware, for hospitals and the healthcare industry in general, for the rapidly growing cannabis industry, any mass transit system, as well as for Fortune 1000 companies, to name a few. “Our virtualized solution especially appeals to these verticals because of the number of cameras, the need for 24/7/365 video recording and extensive data retention requirements, and where loss of video data cannot be afforded,” says Larson. Purpose-Built Solutions BCDVideo’s HCI-VS is the latest example of products BCDVideo is creating for the physical security industry. “We purpose-build and engineer our solutions specifically for video surveillance with the ability to scale-out as needed,” says Kelly Kellen, BCDVideo’s Director of Marketing. “We engineer new products to address problems in the marketplace. Our CTO is really looking at the market and studying the security integrator’s pain points. Then we engineer solutions to best serve them.”
Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-Enabled Cameras Bots can infiltrate unprotected computers and then use the computing power of their ‘hosts’ to carry out various kinds of cyber-attacks on other Internet targets. In the case of the Mirai attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s video products to launch the headline-grabbing cyberattack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders Safeguarded Communication Since 2016, awareness of cybersecurity for video systems has grown. Today, it is understood that video solutions should be designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted, and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). Some basic best practices can go a long way to improving the cybersecurity of video systems. A small change is to remove default passwords from products and software, and to avoid using ‘guessable’ passwords. All firmware should be encrypted to reduce the possibility of it being downloaded from the manufacturer’s website and deconstructed. Use of a secure operating system that is regularly updated can protect against video tampering, altering, spoofing and snooping. Video Surveillance Systems Another precaution is to avoid remote login using Telnet or FTP, which are less secure. Finally, use of digital certificate provides assurance that data from a third party is true and not falsified. All data should be encrypted with digital certificates. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats Free downloadable guides and other resources provide specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. For example, the OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. Hardware-Level Encryption It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks. Another cybersecurity requirement is data-at-rest encryption to ensure that data, such as stored video, is secure right down to the storage medium in which it is held. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Despite the clear benefits, data-at-rest encryption lags other areas, such as network and endpoint security, in terms of the investment it currently receives. A Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security.
Schneider Electric’s long-rumored sale of Pelco appears to be on the verge of consummation. Schneider this week entered exclusive negotiations with Transom Capital Group, a U.S.-based private equity firm, to sell the Pelco business unit. Pelco is a security industry stalwart and global specialist in the design, development, and delivery of end-to-end video surveillance solutions and services including cameras, recording and management systems software. Revenue in 2018 was about $185 million. Pelco currently employs a staff of 478. Pelco was sold to Schneider Electric for $1.22 billion in 2007 to enhance Schneider’s building automation business Transom Capital Group, Los Angeles, is an “operationally focused” private equity firm that invests in companies in the lower-middle market. Their management claims “industry expertise to create improved operational efficiency, significant top-line growth, cultural transformation and overall distinctive outcomes.” Presumably a “turnaround” initiative could reinvigorate Pelco after several years of decline. Transom promotes an “approachable, collaborative, and down-to-earth problem-solving approach.” Founded in 1957 and originally specializing in pan-tilt devices and joysticks, Pelco rose to prominence as an independent company in Fresno, Calif. Expanding to distribution in more than 130 companies, Pelco succeeded in part through an emphasis on customer service. The company was sold to Schneider Electric for $1.22 billion in 2007 to enhance Schneider’s building automation business. The Pelco business has declined substantially under the Schneider umbrella, and the synergies with building automation were never realized. Pelco has been rumored for sale for several years.The sale would come after Schneider’s announcement it would be reviewing assets totaling 1.5 billion to 2 billion Euros of revenue In recent years, Pelco has focused on its VideoExpert video management system as the core of end-to-end solutions targeting vertical markets. The company sought to re-establish its position as a global leader in surveillance and security, with new technologies, integrations, quality advancements along with significant support initiatives to provide value and innovation to the security industry community. The sale would come after Schneider’s announcement it would be reviewing assets totaling 1.5 billion to 2 billion Euros of revenue as it looks to focus on energy management and industrial automation. Schneider did not say how much Pelco would be sold for but said the company would book a non-cash loss on disposal of up to $250 million. However, its adjusted earnings before interest, taxes, and amortisation margin would rise by around 10 basis points.
Two of the most important priorities in a manufacturing environment are safety and productivity. Failure to follow safe work practices around machinery on a factory floor can result in serious injury, while poor productivity can erode profits and ultimately threaten the viability of the business. At WCCO Belting, a Wahpeton, North Dakota-based manufacturer of custom rubber products for agriculture and light-industrial conveyor equipment, a March Networks® video surveillance solution plays a key role in enhancing both safety and productivity. Monitor Work Processes “Recently, for example, we had a minor safety incident on one of our machines that was captured by the system,” said Michael Marsh, Senior Technology Administrator. “The video not only allowed us to determine the cause of the incident, it also helped us create a proprietary piece of equipment to ensure that the accident would never happen again.” Safety was the main reason WCCO Belting acquired a March Networks system in 2015 Safety was the main reason WCCO Belting acquired a March Networks system in 2015, but the company soon discovered it could use the technology for other equally important priorities. “We found that we could use the video solution for time studies, to be more effective and efficient,” said Marsh. WCCO engineers use the video to monitor work processes and then tweak them to speed production, while ensuring optimum quality. Security System Integrator The company selected Marco Technologies as its security system integrator in 2015, and acquired March Networks 8000 Series Hybrid NVRs shortly thereafter. Two years later, when WCCO Belting decided to also equip a second production facility in Arlington, Texas, it upgraded to a March Networks Command™ Recording Software (CRS) solution in North Dakota and moved the 8000 Series Hybrid NVRs to its Texas facility. At the same time, the company deployed March Networks Command Enterprise Software to tie all the video from its geographically-dispersed facilities together, said Marsh. The software enables WCCO Belting “to oversee everything and manage the entire system from a single point of entry.” In addition, approximately 50 March Networks IP cameras — including indoor domes with wide dynamic range and outdoor IR bullet cameras — provide crystal-clear video of activity on the company’s factory floors, loading docks and parking lots. Remote Configuration Marsh cites ease of use and outstanding support as the main reasons for selecting the video solution. “The technology is easy to implement, easy to use and easy to navigate. Support has also been great. When we ran into some early issues, they responded quickly to help resolve the problem.” We didn’t have to uproot a lot of the architecture already in place" “More recently, when we decided to expand the system to include our second location, it was Marco that recommended the CRS solution and the redeployment of our NVRs to Texas. It was really plug and play. That was the winning piece for us. We didn’t have to uproot a lot of the architecture already in place.” A system that was easy to rollout was important because WCCO Belting’s IT department does the physical camera install themselves, while partnering with Marco Technologies for remote configuration. Command Mobile App “It’s one of the reasons we like March Networks, because we’re a hands-on IT department,” explained Marsh. “We like to make sure we’re always on top of things and that we understand the equipment we’re working with. If we can’t install it ourselves and need someone to come in and do it for us, it just creates future costs.” Aside from the IT department, which has administrative access to the system, authorized supervisors and managers at WCCO Belting are able to audit video for safety and security purposes. Temporary access is also provided to engineering staff for time studies. Marsh and several supervisors also have access to video through the Command Mobile app on their smartphones. Available as a free download from the Apple Store and Google Play, Command Mobile runs on iPhones, iPads and Android devices. Track Offending Vehicle Remote, after-hours access to video proved valuable during the previously mentioned safety incident, for example, “by allowing managers to pull up video from home and use it to make decisions quickly,” said Marsh. The video solution has also proven useful to local law enforcement, as some of the bullet cameras covering the employee parking lot at the North Dakota facility also have a clear view of North 9th St., a busy artery in the town of 8,000. The video resolution was so good that we were able to quickly track the offending vehicle" “One day, I was called to the front desk and met by two police officers and three sheriffs,” recalled Marsh. “They wanted to come to my office but didn’t say why. I was never so nervous in my life. Once in my office, they explained that they wanted to see if we had any recorded video to help them solve a hit and run a block and a half down the road. We did, and the video resolution was so good that we were able to quickly track the offending vehicle.” Rubber Belting Solutions “We’ve had two law enforcement visits since then, so now when they show up, I know I’m not in trouble,” joked Marsh. A family-owned business, WCCO Belting was founded in 1954 by Ed Shorma, a Korean War veteran who mortgaged the family car and borrowed $1,500 to buy a shoe repair shop. Propelled by Shorma’s strong work ethic and talent for ingenuity, the business grew and evolved as a manufacturer of rubber belting solutions, leading to Shorma’s recognition as Small Business Person of the Year by U.S. President Ronald Reagan in 1982. WCCO Belting is currently led by president and CEO, Tom Shorma, Ed’s son, and has 270 employees — 200 in North Dakota and 70 in Texas. The company’s rubber product solutions are sought after worldwide, and exported to customers in more than 20 countries. The company won North Dakota’s Exporter of the Year award in 2003, and in 2010 and 2016 it was the recipient of the Presidential ‘E’ Award and ‘E-Star’ award for its export promotion efforts.
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorized personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorized staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. Business Intelligence Our March Networks surveillance platform is providing us with some significant business and non-security-related uses" “Our March Networks surveillance platform is providing us with some significant business and non-security-related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said. People counting data — collected by FLIR Brickstream3D sensors integrated with the Searchlight software — tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. Video Surveillance Products The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately. “It’s a huge plus for us,” said Ishikawa. “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.” A forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. Network Video Recorders 'March Networks’ products are really engineered for the banking environment" “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, "March Networks’ products are really engineered for the banking environment,’ so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 Series Hybrid Network Video Recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and management, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 Series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organized in place. Existing Analog Cameras “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said. “That’s huge for us.” According to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analog cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa. Dynamic Range Technology Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which capture 4MP images and feature high dynamic range technology to optimize image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. More Comprehensive Oversight “It’s so easy to search,” said Ishikawa. “It takes us exactly to that transaction and the associated video so we can figure out what transpired.” The bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information. Being able to remotely access video also helps Ishikawa’s security team conduct virtual patrols. This saves them both time and money. Uniformed Security Member Capturing video of the incident helped underscore the serious nature of the situation “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits and, when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behavior, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. Investigating A Fraud “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too.” Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said. “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.”
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Genetec Inc., a technology provider of unified security, public safety, operations and business intelligence solutions, announces its solutions have been selected by the Royal Borough of Windsor and Maidenhead (RBWM) for region-wide CCTV monitoring and community safety purposes. The new system will result in better coverage across the borough and enable information to be quickly shared with regional police as and when required. At the heart of the program is a completely refurbished monitoring center, equipped with the Genetec flagship unified security platform Security Center and other complementary Genetec security solutions. KiwiVision Privacy Protector The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change These include the KiwiVision Privacy Protector to simplify GDPR compliance, Genetec Mission Control to guide operators in providing a consistent response to incidents and Genetec Clearance for the easy and secure sharing of evidence with local law enforcement. The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change. It also allows RBWM to protect its past investments by retaining the majority of its existing cameras, alongside the 200 that will be added, upgraded or relocated. “The safety of residents and visitors in the borough is a priority, and we are pleased to be installing a new-state of the art system that delivers this,” said Cllr. Mike Airey, cabinet member for environmental services. Improved Information Sharing “We not only benefit from reduced operating costs and improved information sharing with local police, but we also gain access to cutting edge privacy controls that make it far simpler for us to maintain our compliance with the EU GDPR and other data protection regulations.” The project began when specialist town center video surveillance consultancy firm Global MSC Security (MSC) was called in to assess the Royal Borough’s existing analog video surveillance system, its fitness for purpose and how it could be cost-effectively improved. This resulted in a competitive tendering exercise won by Computerised & Digital Security Systems Ltd. Cost-Effective Response (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system. Some of the key technical benefits delivered by CDS include full HD recording, advance graphical mapping, advanced incident response, customisable and extended video storage retention, and various features to aid data protection regulation compliance such as automated pixelisation of images and end-to-end encryption to enhance privacy controls “Genetec is delighted to see our solutions chosen by the Royal Borough of Windsor & Maidenhead for this well thought out upgrade that will benefit the council, local police and citizens”, added Dan Meyrick, Regional Sales Manager, Genetec Inc. “I would like to thank and congratulate our partner CDS for producing a high quality and cost-effective response that delivered against the customer’s requirements.”
Located southeast of Los Angeles, California, the City of Whittier hosts a water pumping utility installation that provides water to the businesses and residents of the surrounding Gateway Cities Region. In recent years, the installation routinely suffered attacks by vandals and looters, resulting in regular defacement with graffiti and the theft of copper components from pumping stations. This caused interruptions in service to businesses and residents across the surrounding cities. To ensure the security of the water installation and avoid public health and safety concerns, the City of Whittier turned to a virtual guarding solution from iNet Security LLC. iNet Security leveraged comprehensive monitoring from the Surveillance Acquisition Response Center (SARC), powered in part by IDIS technology, for a high-performance video surveillance solution that has already shown powerful results. Enhancing Multi-Site Security And Safety The City of Whittier turned to a virtual guarding solution from iNet Security LLC With the health and safety of the City of Whittier and its surrounding region potentially at risk, it was essential that any security solution deployed by the city be dependable, effective, and capable of low-maintenance 24/7 monitoring. The system also required ease of remote use as the installation is located in a remote wildlife preservation area far from the city center. Any surveillance solution had to: Secure multiple locations within a remote wilderness location Manage authorized access to installation premises Maximize security of the installation with encryption speeds capable of constant live monitoring Provide compatibility and integrate seamlessly with SARC virtual guarding systems Enable the coordination of live responses to security events Feature intuitive software that is easy for users to operate and master. Representatives of the City of Whittier reviewed systems from several manufacturers before they determined that the virtual guarding solution from iNet Security, powered in part by IDIS, would best meet their requirements. DirectCX Technology And Center VMS The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology SARC and the City of Whittier leveraged technology from the high-performance and cost-effective IDIS DirectCX solution and IDIS Center video management software (VMS) to meet their remote monitoring needs. The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology. IDIS incorporated its expertize in image processing to provide unrivaled HD recording performance at an affordable price point for the responsibly cost-conscious City of Whittier. Designed for simplicity, convenience, and performance, the DirectCX technology and the powerful, full-featured IDIS Center VMS incorporated by iNet Security have proved to be optimal components of the comprehensive solution, meeting the challenges faced by the City of Whittier. IDIS HD-TVI DVR The most powerful IDIS HD-TVI DVR, the TR-4116 16 Channel Full HD Recorder, offers: Support for HD-TVI, 960H, and analog cameras Up to 480ips Full HD recording Full HD display with HDMI and VGA output Support for CVBS spot monitor Long distance transmission over coaxial cable Support for HD-TVI camera OSD control over coaxial cable Expansion up to 32TB using 4 SATA interfaces and 1 eSATA storage interface One click network configuration using IDIS For Every Network (FEN) service Dependable Security Environment IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations In partnership with iNet Security and SARC, IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations. Within the first week of installation, a group of vandals was caught attempting to fault the installation fence and was successfully deterred remotely using SARC’s remote “voice-down” protocol. In a dramatic security and safety success, the system was used to coordinate a fast and effective response to two isolated fires as well as a dangerous wildfire that threatened both the utility and surrounding wildlife. SARC operatives utilized IDIS technology, in part, to accurately and quickly guide first-responders through the remote wilderness to the site of the fires, minimizing damage and risk to the surrounding areas. Thanks to the power and performance provided by the iNet Security solution, including IDIS DirectCX technology, the City of Whittier is benefiting from: Low total cost of ownership Unparalleled ease of use through the IDIS Center VMS Complete dependability of system components Lower system maintenance requirements A scalable solution to allow for expansion to additional installation sites
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat Intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security Automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimized to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-In Intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behavior, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control center staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make Significant Differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end"“We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralized storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?
Seeking to manage uncertainty is part of the core mission of security professionals. When it comes to the technology systems they depend on every day, extended service agreements are a tool to manage uncertainty as it applies to system operation. We asked our Expert Panel this week to comment on how extended service contracts benefit users, integrators and/or suppliers. Their answers effectively enumerate multiple benefits to all parties involved. Ongoing service and maintenance help to ensure continuous, dependable operation of security systems. Seeking to manage uncertainty is part of the core mission of security professionals. When it comes to the technology systems they depend on every day, extended service agreements are a tool to manage uncertainty as it applies to system operation. We asked our Expert Panel this week to comment on how extended service contracts benefit users, integrators and/or suppliers. Their answers effectively enumerate multiple benefits to all parties involved. Ongoing service and maintenance help to ensure continuous, dependable operation of security systems.