Digital video surveillance
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020....
Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights&rdq...
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving center to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the video surveillance operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitor...
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Mat...
“Open systems” has been a security industry buzzword for decades, although reality has sometimes diverged significantly from the ideal. The current state-of-the-art in open systems provides a multitude of benefits to increasingly complex physical security systems. We asked this week’s Expert Panel Roundtable to elaborate: What is the impact of open systems on physical security?
The Horwitz-Wasserman Holocaust Memorial Plaza, located in the heart of Philadelphia, is a living testament and tribute to the victims of the atrocities of the Holocaust. The goal of the Memorial Plaza is to educate visitors on this shameful time in history and compel them to work towards a world of tolerance and enlightenment wherein nothing like this could ever occur again. The Delaware Valley Intelligence Center (DVIC), weighed in on the needed security measures. Under the institutional umbrella of the Philadelphia Police Department, DVIC serves as the regional fusion center and utilizes a collaborative and proactive approach to forecasting, preventing and/or responding to all-threats, all-hazards and major events. They assessed the video surveillance requirements of the Memorial Plaza. Video surveillance cameras The Foundation’s construction company then compiled the specifications, based on the DVIC’s recommendations, and Convergint Technologies, a global, service-based systems integration company, delivered the best proposal to suit their needs. Convergint specified video surveillance cameras from Hanwha Techwin. Because of the large size of the Memorial Plaza and park area, a standard definition camera wouldn’t suffice, so Convergint opted for Hanwha’s high resolution PNO-9080R 4K Network IR Bullet Camera. This model allows the viewer to zoom in and see, in close detail, the face of someone passing by the camera who may be a suspect. The PNO-9080R from Hanwha's Wisenet P series performance IP camera line is a 4K camera key in capturing people and events in full detail. IR bullet camera This 5 megapixel resolution camera works well in both day and night conditions For the actual Memorial site at large, such high resolution wasn’t required, but Convergint, in the interest of overall protection, recommended and installed the XNO-8080R 5 megapixel network IR bullet camera to ensure safety all around the perimeter of the park and Memorial Plaza area. This 5 megapixel resolution camera works well in both day and night conditions, and features analytics for loitering, directional detection, fog detection, audio and tampering detection, as well as digital auto tracking and sound classification. The Hanwha cameras are tied into a Genetec Security Center VMS, which allows authorized administrators from as well as the local Police Department to log in and view the video footage at any time. The Horwitz-Wasserman Holocaust Memorial Plaza was not spared from anti-Semitism. Positive identification of suspect It was vandalized by a man who etched the initials “REM” and two SS bolts – a known Nazi symbol – into the memorial’s pillars. With the help of the Hanwha surveillance cameras, the perpetrator was quickly apprehended. “The cameras proved to be fantastic in resolving the June incident,” said Jennifer Wright, Project Manager at the Philadelphia Holocaust Remembrance Foundation. “I looked at the footage and was able to get a few different angles of the person responsible for the crime. The footage was of good quality and I could clearly see him. We sent it to Philadelphia Police Department and they put out a media advisory; we also shared images of the person responsible for the defacement of the Six Pillars on Facebook. Footage of the incident was shared thousands of times on social media. Public sharing of these images eventually led to a positive identification of a suspect.”
On October 27th, Dahua Technology, a pioneer in video-centric smart IoT solution and service provider, hosted its annual summit "Dahua Heart of City – Leading The Intelligent Twins Evolution" in Shenzhen, China. More than 400 industry representatives, industry experts, and mass media have witnessed the achievements of Dahua Heart of City (HOC) on empowering various industries and leading the smart applications in the era of "Intelligent Twins", as well as the release of cutting-edge technologies based on 5G, AIoT, and big data. Dahua HOC Leads The Intelligent Twins Evolution Dahua President, Mr. Ke Li, delivered a speech on behalf of the company and expressed warm welcome and gratitude to the guests. By reviewing the strategy and achievements of Dahua HOC in the past year, Mr. Li shared the situation in which AIoT built digital twins and promoted the new growth of smart economy. According to him, the continuous evolution of technology has caused users' needs to be constantly updated, forging user value to lead "The Digital Twins" to "The Intelligent Twins". Supported by security and network systems, Dahua Technology has released five products of the third generation of "Ruizhi" series Based on its years of expertise in the industry and understanding of customers' business, Dahua Technology has been continuously enhancing its core capabilities in AIoT and big data with focus on intelligent twins, in order to create closed-loop management from the sensing level to the business level, and to build a new smart city architecture with closed-loop value chain. At the same time, Dahua Technology will continuously work together with its partners to strengthen the new driving force of closed-loop customer value. Sensing, intelligence and computing Mr. Jun Yin, Vice President of Dahua R&D Center, delivered a keynote speech regarding "AIoT, Building The Cornerstone of The Intelligent Twins" and explained the significance of Dahua Technology's AIoT strategy: video as the core, to build leading sensing and intelligent capabilities; and reliance on whole network computing, to fully and truthfully build the data value of intelligent twins. Based on the company's "4 Full" strategy, Dahua Technology has comprehensively upgraded its three core capabilities of "sensing, intelligence, and computing". Supported by both security and network systems, Dahua Technology has released five major products of the third generation of Dahua "Ruizhi" Series. Mr. Yin also added that Dahua Technology will continue to accelerate the commercialization of new technologies, build a four-dimensional digital world to support the application of AIoT, and join hands with partners to strengthen the openness of AIoT capability in order to create new value for users. Video-centric cloud architecture In order to achieve customer value for better service and to enhance the flexibility and adaptability of video-centric cloud and software architecture, Dahua Technology released a new DAHUA GAIA big data platform that drives the city from digital to intelligent. The vigorous development of smart cities relies on the participation of all partners in the value chain With the topic "DAHUA GAIA Creates Intelligent Twins Value", Mr. Wenkai Zhou, General Manager of Dahua Software Product Department, shared: "DAHUA GAIA includes 'four ones' – one storage computing network, one intelligent video & image engine, one intelligent data engine and one business-enabled platform – which is a set of architecture that supports online data, value computing and business application". Healthy and orderly development Mr. Zhou added that DAHUA GAIA is the powerful foundation of Dahua HOC. It strengthens Dahua HOC's top-level design and scenario application capabilities, and boosts the construction of new smart cities, entering the "Intelligent Twins" together with customers. He also elaborated the DAHUA GAIA series software products and outstanding industry cases, which attracted lots of interest from guests and media. The vigorous development of smart cities relies on the participation of all partners in the value chain. Dahua Technology has always adhered to the concept of open cooperation and win-win. Together with its partners, the company has been injecting vitality into Dahua HOC, exploring a more refined city governance method and applying it to every aspect of city development, creating a more attractive and distinctive city that leads to a healthy and orderly development of new smart cities in the country.
Promoting the company’s ethos of establishing close working partnerships, CCTV design and manufacturing company, 360 Vision Technology, is celebrating a long-term technical relationship with IP CCTV and security system specialists, Check Your Security. Based in the east of England, with offices in London and Liverpool, Check Your Security offers a wide range of professional expertise and experience in delivering integrated security solutions, using best in class technology - and were the very first early-adopters of 360 Vision Technology’s Predator HD camera 10 years ago. With its founders from the IT industry, Check Your Security identified the need for professional IP services in the security industry, and today, focuses on providing highly-effective integrated digital IP security systems integration. Right from the beginning of their 360 Vision Technology relationship, Check Your Security’s management was keen to take advantage of the market leading technology 360 Vision offered. Carl Pace, Managing Director at Check Your Security explains: “To enable us to meet the current and long-term needs of our customers, we endeavor to develop partnerships with suppliers of market leading and innovative technologies.” Video Management System The close technical partnership between our companies has grown to provide many successful surveillance solutions" “Ten years ago, we wanted to secure a viable solution for one of our long term university customers, where comprehensive electronic surveillance was required on campus. Being a company with a hardware and software agnostic ethos, we turned to 360 Vision Technology and were presented with the opportunity to use the then brand-new Predator HD camera. "The camera’s superior performance meant that we could not only provide the very best imaging quality possible, but also provide on-board white light illumination capability, to add another level of safety and security for the university’s students. Due to 360 Vision Technology’s ability to listen well to our customer requirements and develop their products accordingly, we were able to assist them with on-site/real world development of the Predator product, while the 360 Vision Technology team integrated camera to a Milestone Video Management System (VMS) at the university. "During this time, we helped with many versions of the new camera, testing them at our head office and in the field. The close technical partnership between our two companies has grown to provide many successful surveillance solutions across a range of diverse applications, including hospitals, colleges, ports, corporate headquarters and critical national infrastructure sites.” Integrated surveillance solutions Our engineers are accredited across a wide range of products to ensure we provide reliable services"Mark Rees, Managing Director of 360 Vision Technology says: “As an acknowledged industry leader, 360 Vision is always looking to partner with like-minded electronic security companies, for the benefit of both partners and end-users. With our long-term technical relationship with Check Your Security, we are helping to ensure that end-users can enjoy a fully integrated, hassle-free security solution, and to promote ‘Best of British’ integrated surveillance solutions. "Check Your Security are a valued long-term 360 Vision Technology customer and technical partner. They’ve helped us to develop key technologies in our camera range, and apply their vast installation and application experience to assist our camera development fine-tuning.” development and technical resource “We understand the value of knowledge and training within our team,” says Carl. “As such, all of our engineers are fully trained and accredited across a wide range of products - to ensure we provide our customers with high-quality and reliable service, with a 99% customer retention rate we believe we must be doing something right. This knowledge and experience has been a critical element in our mutually beneficial and professional relationships we with have with all of our customers." "360 Vision Technology’s in-depth development and technical resource is always available to us, with no technical issue ever too small to warrant their attention. 360 Vision’s assistance and advice is always on the other end of the phone, and I’m sure that our working partnership will continue to grow as we develop new projects together.”
VuWall, a pioneer in video wall control and AV network management, announced new engineering and sales hires in the United States. Francisco Provencio has been appointed application engineer while Christian Cooper joins as account manager for the East Coast. These new positions will provide additional resources for customers throughout the U.S. as VuWall continues to grow globally. Currently, VuWall has more than 1000 deployments in over 45 countries, with more than 200 in the U.S. alone. As this number continues to grow, expanding the U.S. service and sales support team is a critical step toward healthy growth for the company. This is a continuation in overall North American corporate strategy, as earlier in the year, VuWall added resources to its marketing and inside sales teams at its Canadian headquarters. "As the demand for agile and scalable video wall and control room systems increases rapidly, VuWall has become the chosen solution provider for many installations in the U.S.," said Paul Vander Plaetse, CEO. Supporting AV integrators We strive to help our customers make informed decisions in their control room projects." "Building a solid American team will make it easier to help our customers achieve a superior visualization experience. Francisco and Christian have years of expertise that will ensure customers are well supported in every step of the design and deployment process.", he adds. Provencio, based in Atlanta, Georgia, has more than 10 years of international experience in the AV industry — specializing in control rooms — having held both technical engineering and sales roles. In this new position, Provencio will focus on the U.S. market, supporting AV integrators and consultants with project designs, technical drawings, and on-site or remote customer demos. Cooper, based in Miami, Florida, is a seasoned AV sales manager with broad experience and technical expertise in control rooms, display walls, and digital signage for utility companies, emergency operation centers, traffic management centers, and other critical infrastructure industries. Prior to joining VuWall, he served as regional sales manager for Mitsubishi Electric. Cooper will focus on supporting integrators, consultants, and end users with their video wall projects. "We are thrilled to have Francisco and Christian join our team. In addition to being an excellent fit with the VuWall culture, bringing them on board is perfectly aligned with our consultative approach to sales," says Maryse Montagne, sales director of North America at VuWall. "Their technical expertise was a critical part in our selection process as we strive to help our customers make informed decisions in their control room projects."
BCDVideo announced the landing of the company’s 100,000th video surveillance recording appliance. The pioneer in video data infrastructure and appliances for the physical security industry is celebrating 20 years in the computer industry, with over a decade in the video surveillance arena. The multinational hardware manufacturer currently records video in 75 countries worldwide under the BCDVideo brand, as well as through over 30 OEM software and camera partners, for whom they private-label systems. The 100,000th system installation was a Genetec™ StreamvaultTM video appliance which will be used in the management of surveillance at an enterprise customer site in the United States. BCDVideo is trusted in purpose-built video surveillance recording appliances and infrastructure. The company’s innovative video surveillance solutions portfolio includes IP video recording servers and storage, revolutionary Hyperconverged Infrastructure (HCI-VS), and network architecture. “We are proud to provide innovation to some of the most influential names in the security industry. This mutual brand trust allows us the partnership to provide and record the video surveillance at marquee companies all over the world.” says BCDVideo’s Chief Executive Officer Jeff Burgess. CRN Magazine named BCDVideo one of North America’s top Technology Solutions Providers and Inc. Magazine designated BCDVideo as one of the ‘fastest-growing private companies’ in the U.S. Also in 2019, the company was honored in as one of the “Best Places to Work in Illinois.”
Custom Electronic Supply, a wholesale distributor of security electronics based in San Jose, California, was acquired on August 30th, 2019 by security distribution veterans Jason Dennis, Lannie Green, Matthew Green, and Danny Cranford. Dennis, along with Matt and Lannie Green, has deep distribution roots. They are the former owners of San Antonio-based Security General International, a privately-held solutions provider specializing in the distribution of emerging technology products and connectivity solutions, established in 1984. They sold Security General International to Tri-Ed in 2012. Cranford also brings to the venture very extensive industry experience and has worked in security distribution since 1987. Access Control and Integrated Systems He also served as co-owner of Security Data & Cable (SD&C) since its inception in 2001 before selling to Tri-Ed in 2010. The acquisition of Custom Electronic Supply was an amicable one, catalyzed by the retirement of one of its two owners, Charlie Cohen. Dave Kelly, its other previous co-owner, will continue to oversee all California operations and the company will continue to do business as Custom Electronic Supply. Wholesale security distribution has undergone many changes over recent years" All employees will also remain on-board, making the transition a seamless one for loyal customers who have come to rely on Customer Electronic Supply as their distribution partner for many years. Product lines span Access Control, Burg, Fire, Video Surveillance, Integrated Systems, Low Voltage Residential Systems, and Installation Tools and Supplies. Personalized service For the new owners – Jason Dennis, Lannie Green, Matthew Green, and Danny Cranford – the time to return to their distribution roots seemed spot on. “Wholesale security distribution has undergone many changes over recent years,” notes Jason Dennis. “My partners and I were not actively looking to get back into distribution. But, we’ve been hearing a lot of dissatisfaction from people in the industry recently." "Customers, employees and vendors have all been voicing their desire for a new alternative. We felt the time was right to offer one and provide the good, old-fashioned personalized service that should never stop being synonymous with a trusted distribution partner,” he adds. “Acquiring Custom Electronic Supply was the right decision that came along at the right time.” The four partners who, together own Custom Electronic Supply under the name Lone Star Systems Supply LLC, look forward to announcing additional new branch openings in the near future.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video Compression Technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF Physical Security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardization organizations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 Compression Formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognizes the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
It is an exciting time at German intelligent video company MOBOTIX, which has launched a next-generation platform that builds on their legacy of video at the edge while opening up the system to third-party partners that can build even more capabilities. MOBOTIX unveiled the new M7 platform and M73 camera at the MOBOTIX Global Partner Conference in Mainz, Germany, in October. MOBOTIX M7 is a powerful, decentralized and secure modular IoT-video system based on deep learning modules. The feedback has been “overwhelming,” says MOBOTIX CEO Thomas Lausten. The new technology will also be featured in the United States at the 2020 MOBOTIX Partner Summit in Hollywood, Fla., in January. A different video surveillance "What you see is a different way of doing video surveillance,” says Lausten. “Our focus on the edge is the difference between us and other companies.” The new MOBOTIX 7 open solution provides an “edge platform” that can be used for a variety of applications, which are provided as “apps” that leverage the platform’s hardware for specific uses, from object detection to face detection to people counting. The new M75 high-end camera incorporates the new platform. The MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time Currently there are 19 apps available to empower various applications, and availability of the MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time. If a MOBOTIX partner creates a new app for a specific project, “now he can use it not just for one project but can put it in the app store and sell it all over the world,” says MOBOTIX CTO Hartmut Sprave. Field Programmable Gate Array The new MOBOTIX platform uses Field Programmable Gate Array (FPGA) integrated circuits that provide flexibility and versatility to be adapted to a variety of needs, from deep learning, to higher resolution, or to use with a variety of sensors, such as color, black-and-white or night vision cameras, temperature sensors or microphones. “We can literally include any sensor requested by the market,” says Lausten. The new camera can also be used for age analysis, crowd management or traffic analysis. It can even be used for fire or biohazard detection, incorporating thermal sensors and deep learning. MOBOTIX have added to their legacy of video with a next generation platform Partnerships MOBOTIX developed its new platform in conjunction with Konica Minolta, which owns a majority share of the German manufacturer. The combined knowledge of the two companies created the new platform, with most of the engineering done in Germany. Konica Minolta provided an object detection algorithm, for example, and deep learning capabilities that are being used with the cameras. The two companies are also developing the business together. “They are rolling out our technology on their website throughout the world,” says Lausten. “We are basically part of a global development organization.” MOBOTIX developed its new platform in conjunction with Konica Minolta The new platform is also completely compatible with legacy MOBOTIX systems: “We have added what we need to what we have,” says Lausten. Cybersecurity is a top priority for MOBOTIX. “With our camera, everything is under our control, every single line of code, and we do all the penetration testing and everything is safe,” says Sprave. In fact, MOBOTIX won the French "Trophée de la Sécurité 2019" Gold Award in the cybersecurity category for the MOBOTIX Cactus Concept, which refers to the fact that all the modules in the MOBOTIX system have “digital thorns” that protect them from unauthorized access. End-to-end encryption is used with no blind spots. Driven by cybersecurity Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure than a system of networked low-cost cameras, each of which could present a possible cyber-vulnerability. Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure The flexibility of the MOBOTIX platform expands its utility beyond security to include broader business functions. For example, the same camera that can detect criminals with face recognition can track where people are moving in a retail store, and even analyze age or demographics of customers to track buying patterns. “Cameras are required to think and process at the edge, and that is where we see a lot of focus going, driven by cybersecurity,” Lausten says. Lausten sees opportunity for even faster growth in the U.S. market, where they already have 30 or 40 partners. In the near term, there will be large opportunities provided by the U.S. trend toward “Chinese skepticism,” and cybersecurity concerns that have plagued the lower-cost Chinese imports. MOBOTIX products are proudly “Made in Germany.”
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. Data capture form to appear here! The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyze data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card on site. Read part one and part three of our banking security mini series.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Theft from stock rooms and shop floors is a persistent problem for retailers. With around €900 million lost annually to thieves in Belgium alone, upscale fashion boutique Patio sought an easy, low-cost deterrent. Code Handle locks fitted on key doors were the answer. A location on Leuven’s most exclusive shopping street did not insulate Patio from retail theft. Shoplifting is a growing problem in many European countries, and thefts had also proliferated at Patio. Thieves were using the store’s toilet to remove clothing tags. Some even went upstairs to Patio’s offices and stole valuable items. Access control system Code Handle proved an ideal solution for us to protect non-public spaces from the public" During a store renovation, manager Jeff Van den Bergh decided Patio’s offices and customer toilet needed proper security. Shoppers and visitors should not enjoy free, casual access to these sensitive rooms. However, he did not want staff wasting their time tracking physical keys when they could be helping customers. An expensive access control system was also ruled out. Door hardware had to look clean and contemporary, to meet the style-conscious standards of Patio’s interior. The store’s security contractor recommended Code Handle, which adds electronic PIN locking to doors without wires or an expensive access system. “Code Handle proved an ideal solution for us to protect non-public spaces from the public,” says Jeff Van den Bergh, Patio’s Store Manager. Door security Door security is operated by a discreet PIN-pad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. "The design fits well within the store,” adds Mr Van den Bergh. Now, Patio customers still use the toilet — but not unsolicited. An employee unlocks the door for them without a key or pass. The door to Patio’s offices is closed to everyone, except staff who unlock it with a personal PIN. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN.
The first Starbucks coffee house opened in in Moscow in 2007 and in ten years the chain’s growing popularity across Russia has seen more than 100 outlets open. There are now several different store formats including classic coffee shops located in shopping centres; stand-alone stores characterized by open vaulted ceilings; smaller kiosk outlets; and drive-through outlets where customers can buy fragrant coffee and fresh-baked goods round the clock without leaving their cars. Following a survey of the latest solutions AVIX recommended IDIS technology as the best option for reliable, scalable video that could be remotely accessed via PCs and mobile devices. Maximum Design IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment, the analog IDIS DirectCX range to leverage existing infrastructure as well as the latest IDIS IP solutions. The VMS also offered the most user-friendly and convenient for use not only for Starbucks security controllers but also by the senior operations managers In the classic coffee house outlets IDIS HD TVI DVRs have been installed handling either 8 IDIS cameras (TR-3108) or 16 cameras (TR-4116) depending on the site requirements. A mix of analog and IP camera technology is used across the Starbucks estate, giving maximum design and installation flexibility. New drive-through outlets are protected by a combination of external and internal cameras. Older Legacy Cameras In the shopping centre kiosk outlets an easy-install and compact full-HD flat dome camera (DC-F1211) has been deployed, while a compete view of the entire point of sale is covered by a vandalresistant IR camera, the DC-D2233WR, with both cameras linked to an H.265 4K recorder (DR-2304P). With thousands of customers visiting stores every day, and hundreds of staff to take care of, Starbucks’ management wanted a robust, flexible video surveillance solution that would operate effectively in every store location and in all store formats. AVIX, a Russian distributor was challenged with designing a system that would deliver optimum quality video regardless of the store format and make use of older legacy cameras in certain locations. The system also needed to be convenient to install while maintaining the aesthetics of each outlet with the ability to focus in on sales transactions in real-time. Maintaining Quality Standards This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion" The system was required not just to ensure high security standards but also to be used by Starbucks’ senior operations managers to control efficiency and underwrite customer service and performance as the number of stores continues to grow. Senior staff in the Starbucks operations department, and security managers, now use the video system day-to-day, verifying working hours, maintaining quality standards and controlling incidents. “This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion. The IDIS Solutions Suite VMS is comfortable and convenient for remote monitoring and it works perfectly by allowing our current mix of IP and analog cameras, including the latest IP IDIS models and equipment. The system is future scalable, and we will easily adapt it to changing needs.” Alim Sizov, General Manager ‘SVS Project’ – Starbucks Partner. Following the success of this first phase installation a comprehensive upgrade to IDIS video cameras is being implemented across the entire Starbucks estate.
Global provider of digital and analog cable television, broadband internet, and fixed telephony in Serbia, SBB brings nearly a decade of experience in serving the largest customer base in Serbia and Montenegro. SBB is a part of the United Group, which operates in six countries of the former Yugoslavia, with sibling companies Telemach, Total TV, NetTV Plus, and more. Their services bring the most popular news, sports, films, children’s programs, and a variety of other content to their growing audiences. As the world continue to advance in the technological development and use of the Internet, companies like SBB play a crucial role in connecting people with each other and with the rest of the world – in the sharing and enrichment of vast varieties of information. Comprehensive Surveillance Solution As SBB’s business and customer base grow, so does its need to expand and upgrade the video surveillance systems at its numerous retail locations As SBB’s business and customer base grow, so does its need to expand and upgrade the video surveillance systems at its numerous retail locations. Nowadays, security in and around the locations is a given, while more important uses of video surveillance technology is monitoring and analyzing customers coming into the store. With useful analytics on customer numbers, lengths of stay, peak times, and frequency of customer visits, the company will be able to improve human resources management, maximize the efficiency of services in the stores, and minimize security risks, all the while saving on costs. To do this, the company needs to upgrade its video surveillance setup from traditional CCTV systems to automated, smart solutions that not only facilitates state-of-the-art security but also accuracy in people counting, ease of setup, convenient storage, smooth and fast content transfer, and high video quality. It must also be easy to manage for the company’s information and security divisions to do their best at their jobs in this day and age. Netiks-VIVOTEK Collaboration To Equip SBB Netiks is a global distributor of network and communication equipment in Serbia and Montenegro and has been SBB’s partner of choice to bring its surveillance systems to the next level. The main focus of the current stage of upgrades is installing more than 50 of the latest FD8166A ultra-mini fixed dome network cameras cross the company’s retail locations which get 450,000 visitors every month and setting up the VAST 2 software to make everything work in perfect unison. FD8166A Network Cameras VIVOTEK’s people counting solution is a smart-edge video analytic function that delivers real-time, bi-directional counting data On the hardware side, the FD8166A has compact, low profile, yet stylish design that fit right into modern, sleek spaces of the retail locations, both on the perimeters and inside the stores. After the easy transition process from traditional equipment, aided by the built-in IEEE 802.3af compliant PoE technology the camera’s 2-megapixel CMOS sensor started capturing 1920x1080 resolution video at 30 FPS. With WDR enhancement and 3D Noise Reduction that come with the cameras, the information and security staffs can tap into crisp and clear images even in extremely bright and dark environments. The defogging capability further defends against adverse weather conditions. VIVOTEK’s people counting solution is a smart-edge video analytic function that delivers real-time, bi-directional counting data across a large field of view. With this function, counting and monitoring data are directly computed rather than relying on a dedicated computer. SBB applied the 2D people-counting solution to count and monitor its visitors. To date, the solution has achieved 98% accuracy. The system stores the data for 90 days and issues push notifications to relevant operators. To ensure uninterrupted access to information on security and flow, the camera supports H.264 compression, which significantly reduces data size, conserving network bandwidth and enabling real-time monitoring of all camera systems across the company’s retail scene. VAST 2 IP VMS Powering this advanced setup at SBB is also the VAST 2 software, which was also introduced to upgrade SBB’s surveillance system. VAST 2 is VIVOTEK’s top-shelf IP video management software (VMS). Behind the stylish, intuitive UI are a suite of functionalities that make the work of the staff easy and effective. VCA report and Smart Search in particular have driven the company's analytical efficiency to unprecedented heights. As central management software, VAST 2 is designed to oversee all surveillance products, which means that the system will be able to scale to more of the company’s retail locations as well as grow with the company's prosperous future expansion.
An upgraded public area CCTV solution using robust video capture technology from IDIS, Korea’s global surveillance technology provider, is safeguarding Leybourne in Kent against anti-social behavior. The new system, designed and installed by iC2 CCTV, has allowed the parish council to work within a limited budget to deliver extended coverage, improved image quality and no data loss. Leybourne is a village with a strong community feel and an attractive rural character however, with good transport links to the nearby M20, residents were concerned about the risk of crime coming in from outside the area. Budget constraints also meant that data-streaming had to be capped and as a result video evidence was only being recorded part time Devise A Solution Prior to the upgrade the village had limited public area surveillance based on outdated analog technology, but it was proving costly to maintain and difficult to adapt to changing needs. Budget constraints also meant that data-streaming had to be capped and as a result video evidence was only being recorded part time. London-based integrator iC2 CCTV was consulted and asked to devise a solution that would work within the funds available. To achieve the lowest total cost of ownership, iC2 CCTV recommended installing the latest IDIS technology on a 5GHz point-to-point wireless infrastructure. At the heart of the new system is a powerful 64-channel, full HD NVR recorder – model DR-8364D – which offers the important advantage of flexible H.265/H.264 dual codec performance. This feature allows recording in high-definition H.265 but viewing on a variety of older screens using H.2264, so it means existing display equipment can be retained. Significantly Improved Protection A combination of 3-megapixel and 5-megapixel IDIS domes and bullet cameras mounted on lamp-posts in key locations gives significantly improved coverage and image detail. And IDIS Smart Failover provides the best guarantee against data loss: if Leybourne’s network connection is compromised for any reason, all recordings continue to be stored on SD cards within the cameras and are then automatically downloaded as soon as the connection is re-established. The IDIS technology together with the wireless network, installed over five weeks by iC2 CCTV without disrupting the village, gives Leybourne significantly improved protection without high ongoing costs. Unlike the old analog system, recordings are now easily searchable with time/date stamped footage and the high definition image quality is ideal for use in investigations and as evidence. IDIS Smart Failover ensures that uninterrupted evidence is always retained in the event of transmission failures Excellent Quality Data IDIS Smart Failover ensures that uninterrupted evidence is always retained in the event of transmission failures, without the need for time-consuming manual data downloads from individual cameras. “This robust, new video system is proving very popular with Leybourne Parish Council and the community and enables us to provide excellent quality data and images for Kent Police and the local authorities,” stated the chairman of the Parish Council Bob Ulph. “It has already deterred a lot of the anti-social behavior that councillors and residents were concerned about and is providing reassurance that any crime in the future will be dealt with.” More cameras can now be easily added, or the location of cameras changed as the need arises, says James Min, Managing Director, IDIS Europe, and the system is protected by the IDIS Ultimate seven-year warranty and the assurance that the technology will be forward-flexible to meet future needs.
Genetec Inc., global technology provider of unified security, public safety, operations, and business intelligence solutions, announced that its unified platform, Security Center has been integrated with Secure Store, a profit protection and exception reporting solution developed by Appriss Retail. With this integration, retailers can now immediately disprove or validate suspicious transactions by accessing the security video evidence associated with suspected fraudulent activity. Security Center And Store Integration Secure Store enables retailers to significantly mitigate losses related to fraud, theft, and operational/systemic breakdowns. Using artificial intelligence and machine learning, Secure Store performs advanced exception modeling from multiple data sources and enables immediate corrective action. US-based retailer, DICK’s Sporting Goods, is using the Security Center platform to monitor over 18,000 cameras across 720 stores and manage 230 cameras and 130 doors at its headquarters. The organization is now using the joint Genetec/Appriss Retail solution to provide immediate insight, reduce shrink, improve profitability and achieve rapid ROI, as Jacob Gillette, Director of Loss Prevention and Operations, DICK’s Sporting Goods explains: Genetec/Appriss Retail Solution The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations" “The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations, which has been hugely beneficial to our organization. Our investigation team can now easily retrieve video from Security Center to validate suspicious transactions that are flagged by the Appriss Retail exception reporting system.” Thanks to the integration of Security Center and Secure Store, retailers can now simply click on the video icon within the Secure Store interface to immediately identify and review the security video related to individual transactions. This allows them to evaluate detailed evidence related to all refunds, transaction items, discrepancies between what is being scanned and what is on the bill, and quickly determine if there was indeed a problem. Importance Of Video Evidence In Fraud Cases The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users" “When you investigate fraud, you need to be able to validate questionable behavior. This is why video evidence is so critical. Thanks to our partnership with Genetec, we are now able to provide our customers with immediate insights that allow them to make informed decisions and build defensible cases based on hard evidence,” said Corey Adams Vice President of Global Client Services for Appriss Retail. “We’re pleased to be able to assist retailers with integrations that help make their teams more productive and significantly reduce loss. The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users,” said Scott Thomas, Director of Retail Market Development at Genetec.
Located one hour outside of London, the borough of Runnymede is a local government district with over 80,000 residents in the county of Surrey. It is one of the most prosperous parts of the London commuter belt and home to some of the UK’s most expensive real estate. In order to enhance public safety, the borough council contracted service provider Safer Runnymede. Working with Nottinghamshire-based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly. Bosch Video Security System Today, Safer Runnymede coordinates all connected solutions in a Control Room in the town of Addlestone, where a staff of three operators monitor security feeds from over 500 security cameras deployed around various boroughs within Surrey. Next to public streets in the area, the flexible system also monitors schools, hospitals and other public buildings around the clock. Every year, the team responds to 20,000 incidents from cameras, and the video security system has proven an asset in monitoring traffic, preventing crime, as well as providing evidence and following suspects after incidents. But achieving this level of integration was a challenge. Connecting the solutions via the BVMS allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure Initially, the video security system consisted of hardware from several different manufacturers including Bosch – making updates or replacements a time-consuming process – that was networked on a Bosch Video Recording Management (VRM) solution. Looking for a future-proof and scalable system built on an integrated software platform, the officials in Runnymede tasked Bosch to design a fully IP-based security camera architecture. IP Video Surveillance System Since the Safer Runnymede system already included a Bosch monitor wall plus encoders, cameras, VRM and storage devices, system integrators could leverage the initial investment into a full suite of Bosch solutions. The system now combines new high-resolution AUTODOME IP 4000, AUTODOME IP 7000, MIC IP 7000 moving cameras, and FLEXIDOME IP 7000 fixed cameras, plus older Bosch and third-party analog cameras paired with encoders, decoders, and DIVAR IP 3000, 5000, 6000, and 7000 recorders. Connecting these solutions via the Bosch Video Management System (BVMS) allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure. The flexible system design and management has provided an integrated approach to our business delivery" As a result, Safer Runnymede has benefitted from superior image quality delivered by the added network video security cameras, without the need of replacing the complete existing analog video security infrastructure; all in a resilient, easily expandable system at a reduced total cost of ownership (TCO). What’s more, the customer has used the flexibility of Bosch solutions in a deployable video surveillance camera at remote locations. Installed in a custom-built enclosure provided by Central Security Systems, it streams video data from an AUTODOME IP 4000 camera via 4G and sends alerts via SMS to the Control Room upon detecting activity such as illegal waste dumping. Bosch Video Management System Migrating from a fragmented, analog system to an integrated IP network managed via BVMS (Bosch Video Management System) has proven a forward-facing decision. “The flexible system design and management has provided an integrated approach to our business delivery, allowing us to make better operational decisions and become more dynamic and competitive in the video surveillance marketplace, “says Les Bygrave at Safer Runnymede.
Round table discussion
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?
Digital video surveillance: Manufacturers & Suppliers
- Dahua Technology Digital video surveillance
- Hikvision Digital video surveillance
- Dedicated Micros Digital video surveillance
- LILIN Digital video surveillance
- eneo Digital video surveillance
- ADPRO Digital video surveillance
- Hanwha Techwin Digital video surveillance
- Vicon Digital video surveillance
- Bosch Digital video surveillance
- Pelco Digital video surveillance
- Messoa Digital video surveillance
- March Networks Digital video surveillance
- Vanderbilt Digital video surveillance
- TruVision Digital video surveillance
- Axis Communications Digital video surveillance
- Geutebruck Digital video surveillance
- Digital Express Digital video surveillance
- Arecont Vision Digital video surveillance
- Everfocus Digital video surveillance
- artec Digital video surveillance
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload