Hybrid surveillance systems
Synology Inc. has announced two additions to its enterprise-class M.2 NVMe solid-state drive line for SSD caching, and its latest generation 10/25GbE network cards to drive forward storage and networking performance on its storage solutions. New 800 GB models for the SNV3400 M.2 2280 and SNV3500 M.2 22110 NVMe SSD lines are designed to let users with larger data sets cache more data, allowing for higher and more consistent performance improvements over HDD-based arrays. Dual-port 10GbE SFP+ E1...
BCDVideo, a globally renowned video data infrastructure solutions firm, has debuted its new Hybrid Cloud Connectivity offering, in partnership with premier software developer, Tiger Technology. Known for their work designing secure, high-performing data management solutions for companies across Enterprise IT, Surveillance, Media and Entertainment, and Small Medium Business (SMB)/Small Medium Enterprise (SME) markets, Tiger Technology’s software expertise pairs with BCD’s prowess in...
Globally renowned IP video surveillance integrator, NW Security (NW Systems Group) has signed a partnership agreement with the major unified, intelligent security-as-a-service solutions provider, Arcules. Arcules VSaaS platform The Arcules Video Surveillance as a Service (VSaaS) platform provides organizations with an underlying cloud infrastructure, which offers features such as compatibility between sites, low video latency, data encryption, redundancy, streamlined maintenance, automatic fir...
Red Hat announced a definitive agreement to acquire StackRox. This is an exciting milestone for StackRox and a tremendous validation of the company’s innovative approach to container and Kubernetes security. It combines the industry’s first Kubernetes-native security platform with Red Hat’s renowned enterprise Kubernetes platform, OpenShift - helping businesses further accelerate their digital transformation initiatives by more securely building, deploying and running their cl...
Eagle Eye Networks, the globally renowned company in smart cloud video security, has shared the trends that will have the biggest impact on video surveillance, security, and use of analytics, to drive business intelligence and improvement in 2021. Cloud and advanced analytics Customers are asking for the cloud and advanced analytics will transform video surveillance systems into even more valuable business solutions. Compliance requirements are constantly evolving and IT departments are engagi...
ExtraHop, the provider of cloud-native network detection and response, announced a new distribution agreement with Exclusive Networks, a specialist IT security distributor, to cover five countries across Europe including Denmark, Finland, Norway, Sweden and Netherlands. The agreement spans the entire portfolio of ExtraHop security and cloud products and services. Exclusive Network’s sole focus is on the distribution of innovative cybersecurity solutions to protect systems, data and applic...
News
Veristor Systems Inc., a trusted provider of transformative business technology solutions, and Verkada Inc., the global leader in cloud-based physical security, announced a partnership for the delivery of secure, reliable, and scalable physical security infrastructure. With cloud-connected devices and the Verkada Command platform, organizations can get a centralized, real-time view into actionable security insights for a complete security picture across physical locations and operational sites. Cloud security & access control solutions "Along with digital security, physical security is a critical component of any comprehensive security framework," said Brian Yost, Cybersecurity Business Development Director, Veristor. "Yet, implementing effective physical security for today's modern buildings can be complex and riddled with gaps and risk. Verkada is changing the dynamics of physical security." "By pairing cloud-enabled security devices and access control solutions with a unified, web-based platform, Verkada makes it easy to manage devices at scale and get the actionable, real-time view needed to ensure physical security across locations and sites." Ideal partner "As a leading security and IT infrastructure solution provider, Veristor is an ideal partner for Verkada," said John Lierley, Channel Sales Manager, Verkada. "They are experts in architecting solutions that enhance organizations' security postures, limiting risk while enhancing operational productivity." " Together, Verkada and Veristor are expanding digital security to protect and manage the security of physical sites while limiting complexity and risk. We are pleased to add them to our partner ecosystem." Security hardware Verkada's high-end security hardware connects to an intuitive, cloud-based software platformVerkada delivers high-end security hardware that connects to an intuitive, cloud-based software platform, enabling modern enterprises to run safer, smarter buildings across all locations. The solutions include a complete line of smart surveillance hardware that makes video security limitlessly smart, scalable, and simple to use. Cloud-based access control Verkada also offers cloud-based access control solutions that manage doors, users, and schedules across the organization. Their devices and access control solutions connect to the centralized command web-based platform for simplified insights and management of all devices at scale. Physical security solution The Verkada physical security solutions are now offered as a part of the Veristor suite of security solutions that are designed to solve business challenges through the intelligent application of next-generation security technology.
Vistacom, a globally renowned provider of audiovisual and communications solutions, has announced that its annual Tech Expo, which highlights the latest technology innovations from its audiovisual, control room and technology partners, will go virtual with a four-part webinar series designed to highlight the latest AV and technology innovations. Earlier this year, Vistacom canceled the in-person expo owing to the ongoing concerns with the spread of coronavirus (COVID-19), but has decided to offer the 2020 Vistacom Tech Expo as a virtual event. Vistacom Virtual Tech Expo Webinar Series Vistacom will highlight industry veterans and thought leaders to provide a comprehensive update on the latest industry trends and predictions live via webinar series, addressing several topics over the coming weeks: July 9: Implementing Hybrid Technology Solutions for a Seamless Education Experience July 28: Developing a Business Continuity Communication and Digital Transformation Strategy Aug. 18: Extending Situational Awareness Beyond the Control Room Sep. 15: Technology-as-a-Service - Leveraging New Financial Options and Buying Models for Future-Proofing Technology Upgrades Shift to virtual events globally Technological advancements and growing challenges in the current climate are driving innovation The shift to online events appears to be the new normal. Technological advancements and growing challenges in the current climate are driving innovation as recent studies show that by 2020’s end, 80% of internet traffic will be from virtual conferencing. “A virtual event provides Vistacom with an avenue to reach even more attendees interested in learning more about the emerging technology that organizations are quickly adopting in response to this changing business environment,” said Dan Gundry, Director of Sales and Marketing, Vistacom. Insights on audiovisual technology solutions He adds, “The series brings multiple thought leaders and technology experts together to provide insight into the newest trends and solutions in the AV industry, all from the comfort of your home or office, wherever that may currently be.” Vistacom’s Tech Expo 2020 webinar series is free to attend. The Vistacom Virtual Tech Expo is sponsored by Barco, a global technology company that develops networked visualization solutions for a variety of markets.
Video surveillance technologies continue to evolve. Salient Systems looks at some of the fastest-growing areas in this sphere, including AI-based video analytics and cloud-based video access and recording. Market awareness will continue to drive interest, which will, in turn, drive available solutions and offerings in 2020 and beyond. Another trend to watch out for is more VMS interfaces offering greater access-to and control-of analytics information and access control systems. This relates to the ongoing trend of consumers moving towards unified video/access/analytics solutions. Consumers will benefit in the coming years from simplified offsite access, automated analysis of security events, and better presentation and reporting of security information. Cloud-based AI Analytics The number of video analytics companies that have come into being over the past three years is tremendous The number of video analytics companies that have come into being over the past three years is tremendous. The growth has accelerated over that time due in great part to the popularity of GPU hardware for applications beyond video games or CAD/ CAM, such as deep learning, computer vision and AI. However, with more sophisticated analytics come significant processing requirements and high server hardware costs. This high hardware cost puts analytics out of reach to most video surveillance consumers. Depending on the analytic being used, how many cameras are analyzed, camera resolution, etc., the upfront hardware cost of a deployment designed for processing under a dozen cameras could easily exceed US$ 10,000. As a result, more analytics companies this year have begun offering cloud-based AI analytics. Video analytics and cloud The premise is simple, instead of deploying hardware onsite for processing the analytics, video is streamed to the cloud, where servers with the analytics software are hosted. The analytics software is configured to provide alerts when detection occurs. Upfront hardware costs are replaced with ongoing monthly fees, making the acquisition cost of the technology much more affordable. The downside of this model includes lower scalability and higher ongoing costs. Scalability Scalability is limited by the consumer’s internet connection speed, due to the need to upload video to the cloud for processing. This is not likely to limit adoption for many consumers, because it is not uncommon for only a subset of cameras at a site to require analytics processing. In the event a high number of cameras need to be analyzed, many cloud-based analytic solutions can process video at a lower resolution and/or frame rate while still achieving accurate detection. Unified GUIs from VMS platforms Several prominent security product manufacturers have been moving toward providing unified solutions Several prominent security product manufacturers have been moving toward providing unified solutions, as opposed to focusing on a single product area to develop a “best of breed” offering. This move is driving a shift in thinking with consumers, putting more emphasis towards deeper integration of complementary security technologies, and a corresponding need to easily associate security data. As such, consumers want access to all the information in a single interface, which allows for the association of complementary security data. As an example, if a cardholder presents an access control credential to enter an area, the access control system would show the name of the individual associated with the credential that had unlocked the door. Ensuring authorized access The video system would display the person walking through the door. If the live video and the access control records are presented together in the same interface, a security officer would be able to see the person who walked through the door was not the person associated with the access credential. Traditionally, most integrations occur between video and access control systems. Users would view the integrated video and access data in the access control system interface. Technologies such as point-of-sale integration, license plate recognition and video analytics have become more widely used over the past several years. Moving towards single unified interface Data from those technologies are best presented within the video surveillance system, and as such, it makes sense for video management platforms to move towards becoming a unified interface. Several VMS providers have already taken steps in this direction. Either data from a complementary security system can be presented alongside video and other data directly, or add-on components for LPR, Analytics, and the like are purchasable options from such vendors. Hybrid cloud VMS functionality Interest in cloud-based video surveillance deployments continues to grow Interest in cloud-based video surveillance deployments continues to grow. Market awareness and education is high, due in great part to the growing number of available solutions, including those from mainstream VMS Platform providers. However, full Cloud VMS deployments in the professional market are not yet widely utilized as a result of high bandwidth costs, which limit scalability. Bandwidth costs disproportionally affect mid-sized to enterprise-scale consumers, as a result of those consumers having more cameras and therefore requiring more bandwidth. Even so, benefits such as simplified remote access, which is discussed below, and the ability to scale video retention without adding on-premise storage may drive hybrid cloud features in traditional VMS platforms. Video retention and cloud archiving Traditional deployments utilize on-premise servers with fixed amounts of storage. This traditional model lacks flexibility many users seek. As an organization’s requirements evolve, their video retention requirements may also change. A cloud-archiving service built into a VMS would allow the VMS user to leverage cloud storage for long-term archiving on selected cameras. This capability would remove the need to add additional on-premise storage as retention requirements change. Cloud storage Using cloud storage would allow the user to extend their storage capacity at any time, by simply making configuration changes in the VMS that would correspond to a monthly fee for cloud storage. Another cloud feature that would benefit users of traditional VMS systems is simplified remote access. Users of traditional VMS deployments can set up remote access via the internet using a VPN connection Users of traditional VMS deployments can set up remote access via the internet using a VPN connection or by making the VMS server available via port forwarding on an internet-connected router. Those configurations may involve additional cost, configuration complexity or security risks. VMS-supporting, cloud-based video sharing A VMS-supporting, cloud-based video sharing may allow an administrator to configure remote access by simply checking a few boxes during configuration, causing the VMS to connect securely to a cloud-based server where users can log-in to view selected cameras. This setup removes the need for complex configuration, which would need to be maintained every time there are network changes affecting the VMS servers. Staying ahead of the curve Keeping an eye out for new technologies allows system designers and consumers to identify those which may provide a cost benefit or strategic advantage. With cloud offerings becoming more and more mainstream, new uses for cloud architecture are coming to light in video surveillance. Finally, with technology integrations and video management interface development growing more sophisticated with every passing day, live monitoring practices and security operations center design may be affected in the coming years.
Pulse Secure, a renowned provider of Zero Trust Secure Access solutions, announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top ten NAC vendors by global revenue market share and one of six leading vendors to show market share gain. Frost and Sullivan market report identifies Pulse Secure among top 10 Network Access Control (NAC) vendors by global revenue market share. The 2020 Frost & Sullivan Network Access Control (NAC) Market, Forecast to 2024 report states that NAC is a foundational technology for Zero Trust Network (ZTN). With continued strong adoption driven by cloud, Bring Your Own Devices (BYOD), increasing mobility and the Internet of Things (IoT), the market is expected to reach $2.6 in 2024, growing at 14.3% CAGR from 2019 – 2024. Strict access controls NAC orchestrates and integrates with a variety of network and security infrastructure to support ZTN" “Based on the principle of ‘never trust, always verify,’ Zero Trust Network (ZTN) is a general approach for leveraging various security technologies to enable perimeter enforcement and strict access controls,” said Tony Massimini, Senior Industry Analyst at Frost & Sullivan. “Security vendors with broad product portfolios are integrating their NAC solutions. NAC orchestrates and integrates with a variety of network and security infrastructure to support ZTN.” Pulse Secure offers a portfolio of software-driven Secure Access solutions that provide exceptional usability, contextual intelligence and policy orchestration to support data center and hybrid IT environments while enabling organizations to attain Zero Trust networking benefit. Sold separately or as part of a Secure Access Suite, Pulse Policy Secure (PPS) is a full-featured NAC solution that is easy to deploy, manage and scale. Extensive guest management Highlights of Pulse Secure’s NAC solution within the report include: Markets: Visibility, guest access, BYOD enablement, granular policy enforcement, network segmentation and scalability are main drivers supporting growth, primarily in mid-size to large enterprise across financial services, government, healthcare, high tech and manufacturing. Product: Pulse Secure NAC provides 360-degree visibility and access enforcement to see, monitor and control managed, unknown and IoT devices connecting locally or remotely to the network – extensive guest management, access enforcement and reporting with built-in UEBA. Value: Customers can start with Pulse Profiler to discover, assess and inventory network endpoint and IoT devices. With network visibility, customers can use Pulse Policy Secure NAC to invoke access enforcement and threat response policies employing both 802.1X and non-802.1X control with common infrastructure and security integrations. Value: Each appliance can control up to 50,000 devices and can be centrally managed to control over 1 million devices – a scalable architecture well suited for large enterprises and service providers. Special: Customers gain Zero Trust-based security posture, expedited deployment, scalability and lower TCO by leveraging a common VPN/NAC/SDP Client (agent and agentless), policy and management framework. Operational and economic advantages “With a complete NAC solution as part of Pulse Secure’s integrated Zero Trust Access Suite, our customers are achieving significant deployment, operational and economic advantages over bespoke Secure Access investments,” said Prakash Mana, Chief Portfolio Officer at Pulse Secure. “We are pleased to receive NAC market distinctions and welcome organizations and resellers to see how Pulse Secure can help enterprises realize Zero Trust Network Access.”
Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of PingID multi-factor authentication (MFA) in AWS Marketplace. Customers can now quickly procure and deploy PingID to secure work from home while adding an additional layer of security to their AWS infrastructure. Ping’s Intelligent IdentityTM platform provides enterprises a digital identity solution for securely accessing services, applications, and APIs from virtually any device or location. Hybrid IT environments The PingID MFA service makes it easy for enterprises to offer strongly authenticated access to applications running nearly anywhere, in the cloud, on-premises or across hybrid IT environments. Ping Identity is an Advanced Technology Partner in the AWS Partner Network (APN) and also achieved AWS Security Competency status. PingID complements existing AWS services to allow customers to provide a secure and seamless experience across their cloud and on-premises environments. “Ping Identity is committed to working with AWS to address the security needs of today’s enterprises as they continue their digital transformation initiatives and migrate to the cloud,” said Loren Russon, Vice President, Product Management and Technology Alliances, Ping Identity. “Adding PingID to AWS Marketplace is another important step in helping our global customers quickly increase security at scale and enable secure work from home solutions.”
Pulse Secure, the renowned provider of software-defined Secure Access solutions, announced a successful project with Interdata, as the first Pulse Secure Elite partner to launch a pay-as-you-grow, managed secure access service within France. The Interdata EasyConnect service is aimed at enterprise customers and utilizes initially Pulse Connect Secure, the industry known TLS and cellphone VPN platform, then Pulse Policy Secure next-generation NAC solution, and Pulse SDP (Software Defined Perimeter) to enable enterprises to secure access to individual applications using an “authenticate first, then connect” Zero Trust approach. End-to-end Secure Access solution Working with innovative partners showcases the potential of our end-to-end Secure Access solution" “The move away from legacy, perimeter-based controls and towards Zero Trust is accelerating across the world as enterprises seek to enable workforce mobility and cloud computing while mitigating endpoint, compliance and security risks such as advanced persistent threats and ransomware,” says Laurent Delattre, Vice President of Southern European Sales for Pulse Secure. “Working with innovative partners such as Interdata showcases the potential of our end-to-end Secure Access solution to deliver a Zero Trust approach within the convenience of a SaaS deployment.” Consolidate secure access infrastructure The value proposition for both customer and service provider highlight the potential for additional Pulse Secure channel partners to create similar managed service offerings based on the successful example pioneered by Interdata. “Providing an easier way for enterprises to adopt key elements of Zero Trust with an integrated VPN, NAC and SDP offering is a crucial part of delivering Zero Trust security capabilities and we will be supporting our channel partners moving forward with this strategy,” Laurent Delattre adds. Interdata is a French company that for the last 40 years has offered tailor-made services around the innovative network and cybersecurity solutions for private and public organizations. “Interdata EasyConnect allows Zero Trust access for external staff and partners to reach company resources wherever they are, in private or public cloud,” says Antoine Watissee, Deputy CEO at Interdata, “The service is aimed initially at cellphone users but has the capability to extend right across enterprises that want to streamline and consolidate secure access infrastructure.” Availability for hybrid IT environments Pulse SDP provides direct device-to-application trusted connectivity only after successful user Interdata EasyConnect is offered on a pay-as-you-grow model, managed 24x7 either on-premise or as a hosted service from a French Tier III+ datacenter. EasyConnect offers high availability and scaling options that make it suitable for both mid-market and larger enterprises. The Zero Trust security market size is projected to grow from USD 15.6 billion in 2019 to USD 38.6 billion by 2024, at a CAGR of 19.9% from 2019 to 2024 according to MarketsandMarkets Research. Pulse Secure delivers end-to-end Zero Trust visibility, protection and availability for hybrid IT environments. The Pulse solution portfolio provides remote, mobile, cloud, network and application security with comprehensive VPN, Mobile Device Management (MDM), Single Sign-on (SSO), endpoint and IOT device security, Network Access Control (NAC) and virtual Application Delivery Controller (ADC) functionality. Pulse SDP provides direct device-to-application trusted connectivity only after successful user, device and security state verification. This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability, deployment flexibility, automated provisioning and resource optimization.


Expert commentary
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
IP video recording systems offer high-resimaging, speed & analytics to its end users Familiarity With Analog Systems Familiarity is one factor in the slow conversion of casino customers to IP technologies. Many end users and integrators are comfortable with and have long-term experience with the more simplistic analog systems. However, as IP systems continue to become easier to install and maintain with more plug-and-play technology, this dynamic should change. A problem of latency when controlling pan-tilt-zoom (PTZ) functions of IP systems also suffered by comparison to responsive analog technology, but the problem has been solved. The conversion from analog to IP has been slower than expected, but the trend is beginning to accelerate, says Larry Wanvig, senior national account manager – gaming, Tyco Security Products. Most casinos recognize the benefits that IP can offer in terms of resolution, speed, control and integrations, he adds. As such, casinos often turn to a hybrid approach and try to slowly phase in newer IP video recording systems and cameras. It seems that smaller casinos migrate and adopt IP technology more quickly than the larger “corporate” casinos, which have been a bit slower to make those types of investments, Wanvig says. However, IP conversion is largely decided by budgetary factors. One of Tyco’s casino customers has been a long-time Intellex DVR user and is now deploying the Victor Unified Client and preparing for migration to IP while continuing to use their existing digital video recorders (DVRs). Victor Unified Client allows the casino and others to migrate as budgets permit by providing a single user interface not only for the newer network video recorder (NVR) technology, but also for the older DVR technology. This maximises the casino’s investment and makes the transition to IP easier. Improved Resolution & Control Renews IP Interest High video resolution, a unified interface that leverages video and access control, and reductions in PTZ camera control latency have all impacted casinos’ acceptance of IP significantly, says Wanvig. With increased resolution come improvements in live and recorded video as well as playback quality, which deliver more detail for investigation and incident confirmation. Most casinos recognize the benefitsthat IP can offer in terms of resolution,speed, control and integrations. Casinosoften turn to a hybrid approach and tryto slowly phase in newer IP videorecording systems and cameras The significantly reduced latency of Tyco’s Illustra IP PTZ dome – it can move to position in as fast as 512 degrees per second – has really accelerated the acceptance of IP within gaming. Compared to the responsiveness of traditional analog PTZ technology, some of the earlier IP PTZ cameras experienced significant lag time between the real-time movement of the object and when the image was displayed, making tracking an object difficult. The responsiveness of the new PTZ dome far surpasses that of these older IP PTZ cameras. Tyco Security Products has been providing market-specific products and support to the casino surveillance market for more than 30 years. Historically, Tyco has provided analog matrix systems to help casino operators easily manage multiple viewing monitors from a single keyboard and Intellex DVRs to help casinos migrate to digital video recording. Today, as casinos upgrade their analog cameras and recording equipment and move to IP cameras, NVRs and virtual matrix systems, Tyco’s Victor Unified Client provides seamless control of both analog and IP environments from a single user interface. Tyco’s low-latency cameras give this casino real-time tracking and monitoring, high-resolution imaging, and low bandwidth usage, which cut costs. Powerful NVRs allow the casino to use multiple video streams for live and recorded video and to access it quickly. The unified client leverages real-time alarms and events with video surveillance to give the casino a comprehensive view of their facilities. Any casino that values high-resolution imaging, speed, advanced analytics and complete view of its security could benefit from a similar deployment.
Reinvention of go-to-market models proves integration business is place to be Suffice it to say 2014 was a pivotal year for the majority of alarm dealers and installers. Many have had to change their way of thinking and their method of doing business, while adapting to ever-changing technology. But those who continue to reinvent their go-to-market model prove that the integration business is the place to be – and there’s money to be made, albeit it not in simply installing boxes and hardware. In fact, that mindset changed several years ago, and the participating companies have not looked back since. Competition is always at the doorstep and comes from every angle in the industry - from Google’s Nest energy management to recent announcements that U.S. Cellular (OnLook home automation platform) has joined the ranks of offering security and interactive services, to the likes of Comcast Xfinity, AT&T Digital Life and Time-Warner Cable. And while U.S. Cellular and AT&T Digital Life duke it out, saying they both will excel at the customer “experience,” it’s something that has already fundamentally changed the face of the traditional security industry. Maybe it began after the first break-up of the “Bells” in the mid-80s or later, but most dealers and integrators understand that they are the local, national and traditional firms that can provide the much-needed service every customer craves. Customers will pay more for service, for that personal touch, for being able to reach a live person and perhaps even the owner of the company. And that mindset has also moved the industry more fully into the role of trusted service provider. The Year of Managed Services Across the country, managed services now takes a starring role. Guidant Partners of Nashville changed completely from a break-fix model to a fully-managed IT services role. The changeover required many technology adaptations and capital investments in-house so they could go about providing predictive analysis of networking equipment. The rewards have brought new business to the company and allowed technicians to work smarter, not harder, in many cases avoiding a costly ($250 on average) truck roll. Securadyne Systems, Dallas, also takes the managed services approach, betting on cloud-based services to help its vertical market customers reduce the total cost of ownership and budget more efficiently for regular operating expenses, versus large capital outlays. Advance Technology, Scarborough, Maine, also moved fully into managed services several years ago and calls its proactive plan White Glove Service. President Rob Simopoulos says it’s the only way for systems integration companies to thrive and prosper today. Competition is always at the doorstep and comes from every angle in the industry Technology also assisted the security community in 2014. Remote monitoringand maintenance devices have helped companies deal remotely with their customer’s networks and network-connected devices, and these predictive hardware devices will continue to mature and provide new areas of service. Video surveillance has moved squarely into the realm of business intelligence and data gathering, providing much more than security and adding further value to the arsenal of services, making dealers stickier to their customers. Other 2015 Predictions: Cloud-based services will continue to gain strength, but integrators need to be assured customer data is safe and secure. Video surveillance will be more reliable and couple with intrusion detection and access control for additional layers of security. That sleeping giant, access control, will take center stage, and move from not only providing perimeter and interior security, but data, identity and credential management. Recurring monthly revenue remains critical, but how companies attain it is still in question. Many will see the proverbial “lightbulb” that they should work on their existing customers to garner more RMR and stop chasing too much from new customers. The security industry is a great place to be and will continue to grow. However, only those companies who take it on full force will realize the potential. There are many family-owned businesses who will try to make the transition to the brave new world of services; some will make it and some won’t. Those who do will find their stature in the industry elevated like never before.
Security beat
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long-term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Protecting critical infrastructure An attack by a disgruntled former employee, ideologically motivated activist, or a criminal could inflict significant damage Currently, a significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks can target the grid, and an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target,” could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. Data capture form to appear here! According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure. The number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year Large power transformers A large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually are not interchangeable with each other, and they are not produced for spare-part inventories; so if one blows, a lot of companies and homes could be without power for more than six months. They are not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill. Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. According to EEP, $10 million is a fairly average cost for a large power transformer NERC/CIP guidelines The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC/CIP) guidelines address security needs of electrical substations. Every facility has a baseline requirement for perimeter security protection around the site, although medium- and high-impact sites will have more stringent requirements. The geography surrounding sites – Is it an urban area or rural? Does the surrounding elevation provide additional lines of sight? – also impacts the types of systems they require. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it. Inherited challenges According to the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street. Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. There are many possible targets, too. Approximately 300 control centers around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has cybersecurity issues.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations center, which will contact law enforcement in real time when unauthorized intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernize the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analyzed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralized management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organization. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Case studies
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organizations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilize the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimize air quality, efficiency of our HVAC units, and behaviors in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Customized mobile solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localization via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional center, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions”. IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analog cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognize a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and color of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints.” For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.
Chocolate Nation’s decision to partner with Panasonic for technology at the immersive Belgium museum has delivered the sweet taste of success. Having already attracted over 100,000 visitors in the first nine months of opening, the Antwerp museum says its technology partnership with Panasonic has underpinned its rapid rise as a visitor attraction. Panasonic security cameras Chocolate Nation has deployed Panasonic equipment throughout the museum, shop, restaurant, event and meeting rooms. The technology provides a truly immersive experience for visitors and underpins the effective operation of the business. The range of solutions includes 20 professional display screens, 10 laser projectors, security cameras and the latest telephony solution. Chocolate Nation has deployed Panasonic equipment throughout the museum, shop, restaurant, event and meeting rooms From initial concept, the museum set-out to be an immersive experience for visitors to discover the wonders of Belgium chocolate using their five senses. Through 14 thematic areas, visitors are taken on a journey from the jungle where cocoa beans are grown, through their transportation across the ocean to Antwerp (the world’s largest port for cocoa bean storage), to the making of exquisite chocolate delights and, of course, lots of tasting. High quality video security “The immersive experience is where Panasonic plays an important role,” explains Catherine Stuyck, Head of Marketing and Communications at Chocolate Nation. “Thanks to the large projections on the ceiling, walls, and floor, visitors can really have the feeling they’re standing on a floating container ship. Using light and sound effects, visitors can pass in front of a large imaginary machine in true Willy Wonka fashion to understand how chocolate is made. Afterwards, visitors virtually meet the great Antwerp chocolate makers and are seated in an experimental restaurant where surprising images are projected onto their plates.” More than three years in the planning, the Chocolate Nation founders knew that choosing the right technology partner for the brand-independent museum was going to be critical to creating the magical environment for visitors and a reliable and cost effective business infrastructure. Seamless, flexible installation "After extensive market research, we chose Panasonic as our technology partner for Chocolate Nation," said Jeroen Jespers, Co-Founder of Chocolate Nation. “Panasonic had all the product categories we required and solid in-house expertise. The result is a visitor attraction of the highest quality and an outstanding experience. Obviously, it is only possible because of the absolute reliability of the technology provided by Panasonic”. Jeroen adds, “In addition, their flexible installation outside opening hours and the low maintenance equipment saves a lot of time. If we decide to expand our activities to other countries, we will quickly have a full on-site service with Panasonic, a global player in the sector.” Panasonic LCD and DLP projectors A variety of Panasonic LCD and DLP projectors, ranging from 32” to 65”, have been used in the museum A variety of Panasonic LCD and DLP projectors, ranging from 32” to 65”, have been used in the museum to create the immersive tourist installations and to provide the quality audio visual experience in the event and meeting spaces. The highest levels of security with the lowest total cost of ownership are ensured with the effective use of Panasonic’s 360 degree and indoor dome cameras combined with Panasonic’s Video Insight system management solution. KX-NS700 Smart hybrid communication system The extensive coverage from the 360 degree cameras reduced the number required across the venue and minimized the bandwidth impact on the network. For its unified communication system, Chocolate Nation chose Panasonic’s KX-NS700 Smart hybrid communication system. By using the Panasonic desktop phones, DECT handsets and intercoms as one integrated system, the guests are supported directly when needed. The size of the system ensures Chocolate Nation can expand its communications infrastructure quickly and efficiently as the organization grows.
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organizations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data center applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organization of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cybersecurity training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernized platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer pub called The Filling Station known for its unique combination of ‘growlers, grub and gas’. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability While many things about the family-owned business have changed since its founding in 1973, the need to keep a close eye on each location’s inventory hasn’t. Like every retail organization, Quik-E can cite numerous examples of theft, fraud and inventory errors that have cost the business thousands of dollars in lost revenue. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability, and that’s where its March Networks intelligent video solution really proves its worth. Video system helps curb thefts “I can’t tell you how many thefts I’ve caught with the help of our video system,” said Burgess. “I had a former employee just finish paying me back $13,000 they owed us in stolen goods, and we recently caught another employee who was stealing probably $50 worth of cigarettes each day.” “And just this morning I was reviewing video of a weekly delivery with one of our managers,” continued Burgess. “We were able to confirm that we’d been charged for $77 worth of gloves that we didn’t actually receive. The video showed the delivery guy come into the store and put everything down. Two boxes of gloves is easy to spot, so it was obvious that that portion of the delivery was missing.” Quik-E Food Stores has upgraded its video solution over the years and Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs New software capabilities Over the years, Quik-E Food Stores has upgraded its video solution to take advantage of better performance and new software capabilities. The March Networks video recorders first installed more than a decade ago have been slowly replaced by new generation 8000 Series Hybrid NVRs, able to support both analog and IP cameras or a full complement of IP-only video. Hosted networking solution Burgess has also overseen the transition from older Visual Intelligence software to March Networks Command Enterprise software working with Integrated Technology Group (ITG), the retailer’s long-time systems integrator and March Networks certified partner. That’s in addition to moving the organization from office servers to a hosted networking solution and switching from an existing point-of-sale (POS) system to a new Gilbarco Passport POS solution. “We’ve been proactive about upgrading our IT infrastructure over the last few years, and our video system has always come back online, except in one instance where we couldn’t get the cameras connected again in a couple of locations,” said Burgess. “March Networks Tech Support was wonderful. They managed to diagnose the issue, which wasn’t related to the video products in the end. They were just a big help.” March Networks Searchlight™ Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon Quik-E is also using March Networks Searchlight™ for retail, a software application that integrates surveillance video with the retailer’s POS transaction data to provide powerful search and investigation tools. Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs. “I use Searchlight primarily to look for voids and cancellations, or high dollar value transactions,” said Burgess. “We actually just used it to help catch a manager who probably stole thousands of dollars from us. I knew I was short in inventory, so I pulled up the video and transaction data to see if things were being rung up. It was clear they were not and we had the evidence to prove it. Now we’ll use that evidence to hopefully recoup our losses.” Satisfied customer Ultimately, Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon. “I think it’s one of the best video surveillance systems on the market. March Networks has been good to me over the years and I’m a very happy customer.”


Round table discussion
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Cities are increasingly connected using information and communication technologies, a trend often referred to as “smart cities.” In much the same way, “safe cities” initiatives are uniting businesses, city officials, law enforcement and other stakeholders in an effort to maximize the safety of businesses and citizens and to minimize theft and crime. Safe cities programs seek to leverage a variety of resources, including public-private partnerships, to make urban communities safer places to live, work and shop. It’s a rapidly growing market for physical security products and systems. We asked this week’s Expert Panel Roundtable: What are the physical security challenges of "safe cities" applications, and how is the market meeting those challenges?
Products


Videos
Hybrid surveillance systems: Manufacturers & Suppliers

How To Ramp Up Perimeter Security With License Plate Reader Technology
Download
Solve Access Control Challenges in the Healthcare Sector
Download
Getting the Most Value From Software Subscription Agreements
Download
Shifting Trends in Operation Centers and Control Rooms for 2021
Download