Human area network
DICE Corporation is pleased to announce and welcome Carl Galsterer as the company’s new chief network architect. Galsterer will be responsible for overseeing all aspects of the company’s information technology infrastructure, including the design and implementation of customer networks and process standardization. More About Carl With over 16 years of experience in network engineering as a senior engineer, Galsterer was pivotal in building the Charter Spectrum network throughout Mi...
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physica...
Anyone looking to ensure customer satisfaction in the video server market for security integrators and end users need look no further than the supply chain. Eliminating the inconsistencies and time delays in the supply chain is a key strategy to ensure customer success, and certified systems builders can provide extra value in the process. Tom Larson, Chief Technology Officer, BCDVideo, says supply chain issues impact customer satisfaction for integrators and end users at all stages of an inte...
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-0500-M12-67 series. Antaira’s Industrial Ethernet Switches Antaira’s LNX-0500-M12-67 M12 IP67 Layer 2 series switches have been designed specifically for harsh industrial environments. Our 5-year warranty gu...
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analog, many end users looking for high definition (HD) video quality have been forced to take on a complete system overhaul. Infrastructure Overhaul For HD Video To make the switch, customers would need to change everything, from cameras to hardware to wiring– not to mention the lengthy installation process that would ensue. IP cameras also require higher Internet speeds and more cloud space. Whether constrained by budget, bandwidth or storage, many end users have been unable to adopt this new video surveillance method.Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike. By utilising the current Coaxial cables, this offering yields high definition video, while requiring minimal infrastructure changes and is an optimal surveillance choice for security customers. Plus, with new advancements and updates being made frequently to this technology, there is a solution for every security need. The enhanced alternative of HD over Coax has been warmly welcomed in the security industry, thanks to its simple solutions and ever-evolving features. Many new analog HD cameras are “plug and play,” able to connect directly to existing Coaxial cables. This eliminates the need for a complete system change, creating cost-savings for the end user and an enhanced video quality offering. Easy Solutions For HD Video As a result, integrators can cost-effectively upgrade their customer’s surveillance solution while using their legacy infrastructure, making it an attractive option for end users and an easy sell for dealers. Latency in video is another common issue with network-based camera systems, where even the slightest delay in video surveillance can hinder security response HD over Coax cameras themselves are always expanding and evolving to meet a wide array of security needs. With the introduction of fisheye and multi-sensor cameras, users now have a multitude of coverage options, not to mention the introduction of 4K bringing resolution options to the same level as IP. Some newer technologies are even touting 4K cameras paired with 4K digital video recorders (DVRs) made specifically for analog systems. Longer cables grant transmission for up to 1600 feet, double the distance of standard analog solutions, and triple that of IP systems. This single cable is able to transmit both HD video and audio. Recently, broadcast quality audio over Coax has become available in limited models, a substantial improvement over older analog technology, which was unable to transmit audio. Stopping Video Delay Latency in video is another common issue with network-based camera systems. Even the slightest delay in video surveillance can hinder security response. IP cameras are forced to compress and packetize their video for transmission. The outcome of this is a reduced number of images per video, which in turn causes delay. HD over Coax on the other hand, delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity. Additionally, the point-to-point transmission delivers uncompressed video free of lag. Another touted benefit is that, unlike IP networked cameras, analog systems provide a more secure video transmission. With so much sensitive information housed on a businesses’ network, adding another point of network access through an IP camera can create concerns for cyber security risks. HD over Coax delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity Preventing Network Hacking With HD over Coax, the physical connections between the camera and DVR prevent network hacking. By keeping the video surveillance system offline, security professionals are able to direct their attention to the physical threats at hand, rather than having to focus on deterring cyber security risks. One of the primary difficulties of deploying HD video solutions is the fact that many older systems utilize a wide variety of HD standards and platforms. To make matters more complicated, after HD over Coax was brought to market, manufacturers raced to create their own version of this technology. Today, the most popular proprietary standards are HD-CVI, HD-TVI and AHD. However, integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible.Integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible Diversifying Surveillance Through One DVR To combat these issues, manufacturers have introduced products with more flexibility to their portfolios. One example of this is the penta-brid DVR which grants the ability to seamlessly integrate multiple technologies deployed across one application. This means that systems with diverse camera brands and technologies, such as a mix of HD-CVI, HD-TVI, AHD, analog or IP, can be connected through one DVR. For many end users with legacy analog systems, penta-brid DVRs give them greater freedom to choose between a variety of solutions, rather than being limited to one option. With video resolution increasing, the space needed to store the footage is similarly rising. Penta-brid technology has been able to adapt to these evolving needs, giving users ample storage space to house the HD and 4K surveillance video with some of the newest models including H.265 compression. HD Casino Surveillance Made Simple For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff While HD over Coax is beneficial to many end users and integrators, those in the casino and hospitality markets find it crucial. With a combination of high profile guests, large amounts of cash on hand, constant crowds and strict industry regulations, reliable video surveillance is a must. Deploying new IP systems comes at a stiff price. When looking to upgrade their video surveillance, casinos must also be mindful of the installation process. When moving to an IP-based system, ripping out old wires and replacing them with new is the standard practice. This practice can be both disruptive and costly, not to mention gaming regulations require casino activities be monitored at all times so a complete system shutdown would result in revenue loss. This cost can be hard to justify, especially when the current legacy analog system remains in working condition with only the lower image resolution to date it. For these scenarios, the most cost-effective option is to leverage the legacy infrastructure, replace the existing cameras with new devices, and reap the benefits that HD video has to offer without any lapse in security. For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff. HD over Coax cameras now offer the same resolution as IP cameras with a plug and play approach, that cuts down on expense without sacrificing quality. For businesses and applications that are unable to adopt IP technology, whether it be cost or time prohibitive, HD over Coax now features most of the same benefits IP has to offer without breaking the bank. By providing clear images in real time, maximizing existing infrastructure, and affording cyber security benefits, HD over Coax provides an attractive solution for many end users and integrators.
With IFSEC International fast approaching, 27,000 security professionals are preparing to come together at London’s ExCel to share the latest technology and best practices in the physical security industry. Last year’s show reflected the latest trends shaking the security market, including Big Data and cybersecurity. This year, we can expect speakers and exhibitors to develop these themes in line with recent developments. The industry will need to respond to end users’ questions about collecting and protecting increasing amounts of data from smart security systems.Exhibitors will be expected deal more thoroughly with data security and cyber concerns in light of the reform of EU data protection regulation While data security and cyber vulnerabilities have been big news across the pond at trade-shows such as ISC West, the London-based event will be expected to deal more thoroughly with these concerns in light of the 2018 reform of EU data protection rules, known as the General Data Protection Regulation (GDPR.) Cyber Security For Physical Security Systems Over the last two years, the physical security industry has begun to sit up and take notice of the interdependence of physical and cyber security systems. High profile incidents such as the WannaCry ransomware attack on the UK’s National Health Service have highlighted the threat that the Internet of Things (IoT) poses to business security systems, while the Mirai botnet attack underlined the vulnerabilities of networked security systems specifically. Visitors will receive advice on how to secure increasing volumes of information through the synergy of physical and cybersecurity technologies At previous IFSEC shows, cybersecurity and IoT have played a marginal role, confined to specific zones on the show floor. This year’s exhibition promises to be the arena for an ‘integrated security event,’ with the convergence of physical and cyber security playing out across the show floor. A new ‘Show Me How’ area will provide end users with best practice advice for deploying smart, integrated security systems. The Keynote Arena will host a range of ‘case study’ seminars, offering insights into real world deployments of connected security solutions. Speakers include Silvino Schlickmann, Director of Cyber Crime at INTERPOL, and Dr Pippa Malmgren, Founder of DRPM Group and former Special Assistant to the President of the United States. The Converged Security Centre, brought to the show by Vidsys and partners, will demonstrate how the latest networked technologies can provide security professionals with actionable business intelligence. Visitors will receive advice on how to secure increasing volumes of information through the synergy of physical and cybersecurity technologies.IFSEC 2018 is explicitly addressing safe city concerns with City Forum and London First summits, where strategists can discuss everyday threats European Security Market Trends Attendees will also expect the show to address the regional developments affecting the physical security market. With the ongoing threat of extremism, safe city solutions continue to be big news at European shows. IFSEC 2018 will explicitly address this theme with City Forum and London First summits, which will bring together government and law enforcement strategists to discuss everyday threats, from cyber security to terror. Exhibitors will also need to address the impact of the General Data Protection Regulation (GDPR) on their physical security offerings. At last year’s event, manufacturers were ready to discuss the impact of data protection changes on a theoretical level. Now that the regulation has come into effect, video surveillance and access control companies will need to clearly show how their products and solutions comply to new standards, including privacy by design and the right to be forgotten. While this year’s IFSEC International event reflects many familiar themes we have heard about at recent shows, the three days at London’s ExCel are sure to offer new solutions and wisdom to security professionals who are hoping to weather the challenges of an increasingly connected technology landscape.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The Role Of The IT Department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment” They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The Role Of Consultants And Specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The Need For Standards On Cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organizations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analyzed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardized format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardized industry you will ever see, and security is the least standardized. But they’re merging. And that will drive standardization. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management.IT is the most standardised industry you will ever see, and security is the least standardised" The Role Of Training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organization. That would be a good starting point. The Role Of Integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organization, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organization - so training is very important The Impact of Pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
A few friends from the security industry will gather this April to see, hear and touch the latest technologies to make the world a safer place. Actually, more than a few: there will be more than 30,000 security professionals gathering at the Sands Expo in Las Vegas April 11-13 for the International Security Conference and Exposition, usually known as ISC West. Many of the attendees will be returning to what has become a yearly ritual. The site, the players, the pace and even atmosphere of ISC West are as familiar to many as a family reunion. But the industry is changing, and those changes will be reflected in big ways at ISC West. Let’s consider a few themes we will be hearing about at the show. The Cybersecurity Of Physical Security Systems Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry: How can an industry promote security unless its own products and systems can operate securely? For a long time, no one talked about cybersecurity. Some attending ISC West may wonder if now we are talking about it too much, at the risk of too much talk and not enough action. Almost every contribution to our “review and forecast” articles for 2018 mentioned cybersecurity. Every industry event I have attended so far this year has put cybersecurity front and center. It will certainly be a major topic at ISC West.Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry Here’s the challenge for attendees to ISC West: If every manufacturer talks earnestly about cybersecurity, how can potential customers tell who is really serious about the topic, and who is merely paying lip service to the latest industry buzzword? If we all agree that cybersecurity is “everyone’s problem” – not just manufacturers, but also integrators and users – does no one really take responsibility? As the industry becomes more educated about cybersecurity, we can expect more detailed and challenging questions on the subject to permeate the ISC West show floor. Some manufacturers have likened cybersecurity more broadly to the issue of trust. Do you trust a manufacturer to address cybersecurity issues? Or do you trust them in general? The cybersecurity discussions will begin even before the show floor opens, on Tuesday, April 10, in a session titled “Cybersecurity Tier Zero: A Guide to the First Steps of Cyber Hardening.” – just one of the many other education sessions on Tuesday. The Emergence Of Video Analytics 2.0 Deep learning and artificial intelligence (AI) have become more familiar to the physical security market, and some AI applications are driving new industry trends such as robotics and analyzing Big Data. But the biggest potential impact of deep learning is in the field of video analytics, a decades-old technology that has perpetually overpromised and underdelivered. The video analytics systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest The new wave of video analytics products claims to provide a higher level of accuracy because they operate more like the human brain. These new systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest. But consider the bottom line: Do the new video analytics products really perform and eliminate excessive false alarms? Can they effectively search large amounts of stored video and find the few frames that can make the difference in an investigation? Months have lapsed since the first deep learning products were announced, or at least, “teased”. It’s been sufficient time for manufacturers to develop products that are ready for market, but are they? ISC West attendees will be scouring the booths for the latest developments and asking tough questions about how well these newfangled systems will actually perform.It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business The Changing Smart Home Market We all want Siri to set our thermostat or Cortana to arm the alarm system. We want to view video from our nanny-cams on our smart phones, and to turn on the lights from anywhere around the world. It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business that is the bread-and-butter of many security companies? Bluetooth and Wi-Fi can make a lot of things happen in the smart home environment, but what about other networking standards such as ZigBee and Z-Wave? The stakes are huge, which is why the big tech companies – from Apple to Amazon to Google – are staking their claims in the home automation market. Just this year, Amazon has purchased Ring, a video doorbell and security camera company – which will also be exhibiting at ISC West. But it’s unclear what such moves in Silicon Valley will mean for traditional security companies. The growth of do-it-yourself (DIY) systems introduces even more variables, as do alarm companies with new business models and even cloud-based approaches. Many exhibitors at ISC West – from ADT to Z-Wave – are addressing the new smart home environment and can help those attending the show do the same. About 40 companies are exhibiting in the “Connected Home” arena. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees Drones, Robotics and Education From robots to drones to counter-drone solutions, there other new technologies being displayed at ISC West. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theater for attendees offering sessions on topics such as “Drones – Friends or Foes to the Security Industry?” There is a level of novelty to these technologies, and attendees might be lured by the entertainment value of a subject that may fall outside their job description. But one education session addresses the nuts and bolts in the real world: “Selling the Value of Security Robots by Setting Realistic Expectations.” Could these new gadgets play a bigger role than we think in the future of the security market? For all its familiarity, there is always something new for attendees at ISC West. It may be a startup company with an intriguing value proposition tucked into a tiny booth at the back of the hall. Or it could be a big surprise news announcement from a major player. For attendees, the best surprise of all is that valuable piece of information they can take home to make their business better. Here’s hoping you find it!
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an exceptional dining experience not only with great food, but through superior service and an attractive atmosphere, Jang Su Jang employees will always do their best to provide the highest level of Korean cuisine and customer service.The primary objectives of a security overhaul are to monitor staff and provide overall coverage of dining areas as well as entrances and exits Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits. Solution By VIVOTEK VIVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera installations always provide security during non-business hours. Since 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK Network cameras including a 16-channel network video recorder, ND8401. A security overhaul will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits Perfect Fit For Overall Coverage FD816BA-HT 2 megapixel fixed dome network camera is equipped with a Full HD sensor enabling a viewing resolution of 1920x1080 at 30 fps. Featuring WDR Pro and Supreme Night Visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments.Armed with a removable IR-cut filter, VIVOTEK's solution can maintain optimal image quality around the clock As a professional day/night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology for 180°panoramic view (wall mount) or 360°surround view (ceiling/wall/floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels.The restaurant uses VAST as the central management software designed to manage all surveillance products Finally, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely. VIVOTEK's Effective Solution “When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority; safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Manager of Jang Su Jang restaurant Brian Chung.
In this ever-expanding era of artificial intelligence (AI), Deep Learning will soon become the foundational technology for the security industry. Technologies that “learn” will become more common and more powerful. This trend will strengthen critical security efforts in every sphere. Hikvision’s three camera models equipped with deep learning algorithms will be introduced in the smart retail industry. In the retail business, with the growing popularity of shopping online, the retail sector has felt the disruptive impact of Internet e-commerce more than most industries. Some have reacted to online competition by closing physical stores, but others are attempting to overcome challenges through technological transformation. Traditional retail lacks intelligent tools for accurate data collection and visualization, making it unable to provide a basis for business decision-making at the shop. Hikvision Smart Retail Solution Hikvision has developed a Smart Retail Solution that provides comprehensive CCTV security to protect staff and customers and assist loss prevention. Not only that, this smart retail solution features data collection and analytics for enhancing business value. Benefiting from deep learning technology, three intelligent functions for retail support include people-counting to track customer traffic and volume, heat mapping to know the popularity of goods in the shopping area, and queue detection to monitor the queuing situation in real-time.\ Dual-Lens People-Counting Camera Hikvision’s Dual-Lens People-Counting Camera provides accurate customer counting and generates customer flow trends There is an old saying in the trade industry: “small profits but quick turnover”. And footfall is a “KPI” – key profit indicator – that can help make that turnover. Compared to e-commerce, traditional offline retail stores lack the capabilities to accurately calculate customer flow. Hikvision’s Dual-Lens People-Counting Camera provides accurate customer counting and generates customer flow trends to evaluate performance and strategic initiatives. However, in a real-world scenario, shadows or other objects may easily cause miscounts. The Dual-Lens People-Counting Camera, equipped with two cameras and powered by a deep learning algorithm, easily overcomes such interferences to deliver highly accurate people-counting data. A key advantage of deep learning algorithms over surveillance cameras’ vision algorithms is that deep learning can be continuously trained and improved with better and more datasets. This means the longer it works for you, the smarter it gets. Human Detection Feature Featuring binocular stereo vision, 3D people detection, and height filtering technologies, the Dual-Lens People-Counting Camera is able to accurately distinguish human beings from non-human objects in the background. Hence, these cameras distinguish human beings from other objects and movements in the background. By analyzing customer flow data, store management can optimize the allocation of the workforce to reach higher profits and ensure better customer service. Store managers can schedule staff strategically for peak and off-peak hours. Furthermore, they can also develop strategic marketing activities to attract customers by analyzing the data of incoming rates (entering vs. passing by). Heat Mapping Hikvision’s Heat Mapping function allows retailers to determine the amount of time shoppers spend in specific areas of a store When customers enter the store, retailers are concerned about what merchandise customers are interested in. Before that, what's more important is how to get what route they walk and where they stop. With Hikvision’s Heat Mapping function, retailers can determine the amount of time shoppers spend in specific areas of a store, identify hot spots and dead zones, and measure the number of people who actually shop for specific products, rather than just casually walk by. Heat Mapping is used to monitor and measure the size of target traffic in a region. It is a graphical representation of data represented by colors, and it is usually used to analyze the visit times and dwell times of customers in a specified area. The Heat Map function is often used in shopping malls, supermarkets, museums, etc., and can find customers' preferences over time through heat maps, offering insight how to best place items and design the store layout. Fisheye Cameras As a representative product, Hikvision’s Fisheye cameras, equipped with heat mapping function, not only capture a panoramic high-definition image but also learn about heat conditions in different regions within a store. In spacious areas, fewer cameras means reduced installation and labor fees. Hikvision’s fisheye cameras are ideal for these areas, maximizing monitoring views and image quality insurance. Queue Detection Hikvision Smart Retail Solution is designed to help retailers bring offline stores into a digital world In the retail industry, waiting time is one of the most important factors affecting the customer experience. Hikvision’s Queue Detection function can help retailers manage checkout lines. When too many customers enter a queue, it can notify management to open a new checkout line. More specifically, Hikvision’ queue detection cameras can monitor the queuing situation in real-time. Firstly, cameras count the number of people in each queue, and then track the dwell time of each customer. Once it is found that the number of people in queue is too many, or the average dwell time of customers is too long, an alarm will be triggered to prompt a response. Store management will be reminded to open checkout windows to reduce waiting times, improving transaction efficiency and the entire shopping experience. Hikvision Smart Retail Solution is designed to help retailers bring offline stores into a digital world, allowing data to support management and operations. And it will promote retailers’ technological transformation in response to increased industry competition through the use of innovative retail technology.
Milestone Systems’ open platform IP video management software (VMS) is the technology helping to give peace of mind to residents and visitors of Las Ramblas in Cayala City, Guatemala. Milestone Systems’ XProtect expert software, an open platform technology, was chosen for managing IP-networked video and maintaining continual surveillance over the city’s projects. Network video cameras from Axis Communications are also used, some with crossline detection video analytics. EMC Isilon servers provide the data storage. The open platform Milestone software is compatible with the previously installed security equipment unifying the interface between differences in brand, while featuring larger capacities (in its servers as well), which optimizes resources. The combined solution also integrates easily with existing human resources and procedures, making the process of obtaining valuable information, taking action and preventing incidents more efficient. Designed by urban planner Leon Krier, Cayalá is located in Guatemala’s capital city Virtually Independent City Highly rated and classified as a spotless city, Ciudad Cayalá features impressive colonial buildings, wide pedestrian areas, greenways and - most importantly - a sense of security throughout its streets. Designed by urban planner Leon Krier, Cayalá is located in Guatemala’s capital city. His objective was to create a virtually independent city within the capital, away from crime and the problems known commonly to affect it. The initial project began in the 1980s when the land was purchased. The first residential areas that were built stood out due to their signature white walls but this closed city model led to some criticism related to class division and isolation of the Guatemalan upper class. As a result, the city’s residential community, Las Ramblas, is an open zone that forms a part of the commercial area and the Cayalá offices. Open Area Security Systems Las Ramblas and the project’s future residential phases do not have walls, but are instead open, connected areas. It was exactly this aspect of Las Ramblas that led to its security systems - specifically those designed for open areas - being put to the test. The goal was to maintain the same standard of existing security among the other phases of the Cayalá project. One of the clear and principal objectives was to offer a safe environment for visitors and residents In Cayalá there are more than 1,500 residences, over 400 offices and businesses, and over 50 lofts. At times, the area involves more than 20,000 visitors daily. Thus, one of the clear and principal objectives was to offer a safe environment for visitors and residents; as a result, Cayalá took on the idea of being a ‘Safe City’ from the beginning. Milestone Systems XProtect Expert Software Luis Pedro Rodas is the business manager of Revolution Technologies REVTEC, S.A., the firm that worked with Cayalá to find a security solution. He explains: “In order to carry out a challenge of such magnitude, the city selected Milestone Systems XProtect Expert software as its technological platform. Working together with human resources and processes, it provides the necessary information to take action and prevent security incidents.” All of the Axis cameras are connected to the Milestone video management platform, which interconnects three surveillance centers. For video storage, Cayalá uses EMC Isilon, which holds up to 30 days’ worth of footage. Although there is no physical wall, there are technology systems, human resources and policies at work" “Several virtual security rings exist in Cayalá. Those who enter are being monitored, and although there is no physical wall, there are technology systems, human resources and policies at work,” says Rodas. Prevention Of Security Breaches With an investment of over 2 million dollars in technology, Cayalá has been able to introduce the concept of a ‘Safe City’. The routes of its residents and visitors alike are monitored thanks to a combination of over 120 elements provided by human resources, processes and technologies, which together make it possible to obtain information, take action and prevent security breaches. Héctor Leal, engineer and Cayalá general manager, mentions that this security plan “made it possible to restore the trust, peace and quality of life that had been lost in other cities of the country.”